-
3
-
-
84947237328
-
On the security of joint signature and encryption
-
L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002. Springer-Verlag
-
J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
5
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000. Springer-Verlag
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
35048826242
-
The EAX mode of operation
-
R. Bimal and W. Meier, editors, Proceedings of the 11th Workshop on Fast Software Encryption (FSE 2004). Springer-Verlag
-
M. Bellare, P. Rogaway, and D. Wagner. The EAX mode of operation. In R. Bimal and W. Meier, editors, Proceedings of the 11th Workshop on Fast Software Encryption (FSE 2004), volume 3017 of Lecture Notes in Computer Science, pages 391-408. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 391-408
-
-
Bellare, M.1
Rogaway, P.2
Wagner, D.3
-
8
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2004.
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
14
-
-
33646001565
-
Signcryption with non-interactive non-repudiation
-
Department of Computer Science, University of Bristol, May
-
J. Malone-Lee. Signcryption with non-interactive non-repudiation. Technical Report CSTR.-02-004, Department of Computer Science, University of Bristol, May 2004.
-
(2004)
Technical Report
, vol.CSTR.-02-004
-
-
Malone-Lee, J.1
-
15
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM Press
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 196-205. ACM Press, 2001.
-
(2001)
Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8)
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
16
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attack
-
B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000. Springer-Verlag
-
V. Shoup. Using hash functions as a hedge against chosen ciphertext attack. In B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 275-288. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
17
-
-
63449122349
-
Digital signcryption or how to achieve cost(signature & encryption) ≤ cost(signature) + cost(encryption)
-
B. Kaliski, editor, Advances in Cryptology - Crypto '97. Springer-Verlag
-
Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) ≤ cost(signature) + cost(encryption). In B. Kaliski, editor, Advances in Cryptology - Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|