-
1
-
-
35248817849
-
The EM side-channel(s)
-
Cryptographic Hardware and Embedded Systems, CHES 2002, Springer-Verlag, Berlin
-
D. Agrawal, B. Archambeault, J. Rao and P. Rohatgi, The EM side-channel(s), Cryptographic Hardware and Embedded Systems - CHES 2002, LNCS 2523, Springer-Verlag, Berlin, 2002, pp. 29-45.
-
(2002)
LNCS
, vol.2523
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.3
Rohatgi, P.4
-
2
-
-
15944367466
-
PRIMES is in P
-
M. Agrawal, N. Kayal and N. Saxena, PRIMES is in P, Ann. of Math., 160 (2004), 781-793.
-
(2004)
Ann. of Math
, vol.160
, pp. 781-793
-
-
Agrawal, M.1
Kayal, N.2
Saxena, N.3
-
3
-
-
84947928286
-
Practice-oriented provable-security
-
Proc. First International Workshop on Information Security ISW '97, Springer-Verlag, Berlin
-
M. Bellare, Practice-oriented provable-security, Proc. First International Workshop on Information Security (ISW '97), LNCS 1396, Springer-Verlag, Berlin, 1998, pp. 221-231.
-
(1998)
LNCS
, vol.1396
, pp. 221-231
-
-
Bellare, M.1
-
4
-
-
33846863347
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Cryptology ePrint Archive
-
Report 2003/077
-
M. Bellare, A. Boldyreva and A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Cryptology ePrint Archive, Report 2003/077, 2004.
-
(2004)
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
5
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Advances in Cryptology, Eurocrypt 2004, Springer-Verlag, Berlin
-
M. Bellare, A. Boldyreva and A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Advances in Cryptology - Eurocrypt 2004, LNCS 3027, Springer-Verlag, Berlin, 2004, pp. 171-188.
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM, New York
-
M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, Proc. First Annual Conf. Computer and Communications Security, ACM, New York, 1993, pp. 62-73.
-
(1993)
Proc. First Annual Conf. Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84948986458
-
Optimal asymmetric encryption - how to encrypt with RSA
-
Advances in Cryptology, Eurocrypt '94, Springer-Verlag, Berlin
-
M. Bellare and P. Rogaway, Optimal asymmetric encryption - how to encrypt with RSA, Advances in Cryptology - Eurocrypt '94, LNCS 950, Springer-Verlag, Berlin, 1994, pp. 92-111.
-
(1994)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84947906522
-
The exact security of digital signatures - how to sign with RSA and Rabin
-
Advances in Cryptology, Eurocrypt '96, Springer-Verlag, Berlin
-
M. Bellare and P. Rogaway, The exact security of digital signatures - how to sign with RSA and Rabin, Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin, 1996, pp. 399-416.
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
33846878938
-
Proving tight security for standard Rabin-Williams signatures
-
Preprint
-
D. Bernstein, Proving tight security for standard Rabin-Williams signatures, Preprint, 2003.
-
(2003)
-
-
Bernstein, D.1
-
10
-
-
84957693225
-
-
D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, Advances in Cryptology - Crypto '98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 1-12.
-
D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, Advances in Cryptology - Crypto '98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 1-12.
-
-
-
-
11
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Five. Third Algorithmic Number Theory Symp, Springer-Verlag, Berlin
-
D. Boneh, The decision Diffie-Hellman problem, Five. Third Algorithmic Number Theory Symp., LNCS 1423, Springer-Verlag, Berlin, 1998, pp. 48-63.
-
(1998)
LNCS
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
12
-
-
78650941074
-
Simplified OAEP for the RSA and Rabin functions
-
Advances in Cryptology, Crypto 2001, Springer-Verlag, Berlin
-
D. Boneh, Simplified OAEP for the RSA and Rabin functions, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 275-291.
-
(2001)
LNCS
, vol.2139
, pp. 275-291
-
-
Boneh, D.1
-
13
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Advances in Cryptology, Eurocrypt '97, Springer-Verlag, Berlin
-
D. Boneh, R. DeMillo and R. Lipton, On the importance of checking cryptographic protocols for faults, Advances in Cryptology - Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin, 1997, pp. 37-51.
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
14
-
-
84955604812
-
Algorithms for black-box fields and their application to cryptography
-
Advances in Cryptology, Crypto '96, Springer-Verlag, Berlin
-
D. Boneh and R. Lipton, Algorithms for black-box fields and their application to cryptography, Advances in Cryptology - Crypto '96, LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 283-297.
-
(1996)
LNCS
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.2
-
15
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, J. Cryptology, 17 (2004), 297-319.
-
(2004)
J. Cryptology
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
84957634529
-
Breaking RSA may not be equivalent to factoring
-
Advances in Cryptology, Eurocrypt '98, Springer-Verlag, Berlin
-
D. Boneh and R. Venkatesan, Breaking RSA may not be equivalent to factoring, Advances in Cryptology - Eurocrypt '98, LNCS 1233, Springer-Verlag, Berlin, 1998, pp. 59-71.
-
(1998)
LNCS
, vol.1233
, pp. 59-71
-
-
Boneh, D.1
Venkatesan, R.2
-
17
-
-
85028916857
-
Responses to comments on the NIST proposed digital signature standard
-
Advances in Cryptology, Crypto '92, Springer-Verlag, Berlin
-
D. Branstad and M. Smid, Responses to comments on the NIST proposed digital signature standard, Advances in Cryptology - Crypto '92, LNCS 740, Springer-Verlag, Berlin, 1993, pp. 76-88.
-
(1993)
LNCS
, vol.740
, pp. 76-88
-
-
Branstad, D.1
Smid, M.2
-
18
-
-
0031619016
-
The random oracle model revisited
-
ACM, New York
-
R. Canetti, O. Goldreich and S. Halevi, The random oracle model revisited, Proc. 30th Annual Symp. Theory of Computing, ACM, New York, 1998, pp. 209-218.
-
(1998)
Proc. 30th Annual Symp. Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
20
-
-
84947924912
-
Finding a small root of a univariate modular equation
-
Advances in Cryptology Eurocrypt '96, Springer-Verlag, Berlin
-
D. Coppersmith, Finding a small root of a univariate modular equation, Advances in Cryptology Eurocrypt '96, LNCS 1070. Springer-Verlag, Berlin, 1996, pp. 155-165.
-
(1996)
LNCS
, vol.1070
, pp. 155-165
-
-
Coppersmith, D.1
-
21
-
-
84921068281
-
On the exact security of full domain hash
-
Advances in Cryptology, Crypto 2000, Springer-Verlag, Berlin
-
J.-S. Coron, On the exact security of full domain hash, Advances in Cryptology - Crypto 2000, LNCS 1880, Springer-Verlag, Berlin, 2000, pp. 229-235.
-
(2000)
LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
22
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Advances in Cryptology Eurocrypt 2002, Springer-Verlag, Berlin
-
J.-S. Coron, Optimal security proofs for PSS and other signature schemes, Advances in Cryptology Eurocrypt 2002, LNCS 2332, Springer-Verlag, Berlin, 2002, pp. 272-287.
-
(2002)
LNCS
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
23
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Advances in Cryptology, Crypto '98, Springer-Verlag, Berlin
-
R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology - Crypto '98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 13-25.
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
25
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, IT-31 (1985), 469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
26
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology, Crypto '86, Springer-Verlag, Berlin
-
A. Fiat and A. Shamir, How to prove yourself: practical solutions to identification and signature problems, Advances in Cryptology - Crypto '86, LNCS 263, Springer-Verlag, Berlin, 1987, pp. 186-194.
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
27
-
-
84880853825
-
RSA-OAEP is secure under the RSA assumption
-
Advances in Cryptology, Crypto 2001, Springer-Verlag, Berlin
-
E. Fujisaki, T. Okamoto, D. Pointcheval and J. Stern, RSA-OAEP is secure under the RSA assumption, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 260-274.
-
(2001)
LNCS
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
29
-
-
35248836947
-
A signature scheme as secure as the Diffie-Hellman problem
-
Advances in Cryptology, Eurocrypt 2003, Springer-Verlag, Berlin
-
E. Goh and S. Jarecki, A signature scheme as secure as the Diffie-Hellman problem, Advances in Cryptology - Eurocrypt 2003, LNCS 2656, Springer-Verlag, Berlin, 2003, pp. 401-415.
-
(2003)
LNCS
, vol.2656
, pp. 401-415
-
-
Goh, E.1
Jarecki, S.2
-
31
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all
-
partial information, ACM, New York
-
S. Goldwasser and S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information, Proc. 14th Annual Symp. Theory of Computing, ACM, New York, 1982, pp. 365-377.
-
(1982)
Proc. 14th Annual Symp. Theory of Computing
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
34
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17 (1988), 281-308.
-
(1988)
SIAM J. Comput
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
36
-
-
33846866029
-
On the (in)security of the Fiat-Shamir paradigm, Cryptology ePrint Archive
-
Report 2003/034
-
S. Goldwasser and Y. Tauman, On the (in)security of the Fiat-Shamir paradigm, Cryptology ePrint Archive, Report 2003/034, 2003.
-
(2003)
-
-
Goldwasser, S.1
Tauman, Y.2
-
37
-
-
21144454271
-
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in cryptographic groups
-
A. Joux and K. Nguyen, Separating Decision Diffie-Hellman from Computational Diffie-Hellman in cryptographic groups, J. Cryptology, 16 (2003), 239-247.
-
(2003)
J. Cryptology
, vol.16
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
40
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Advances in Cryptology, Crypto '96, Springer-Verlag, Berlin
-
P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology - Crypto '96, LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 104-113.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
41
-
-
84939573910
-
Differential power analysis
-
Advances in Cryptology, Crypto '99, Springer-Verlag, Berlin
-
P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology - Crypto '99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 388-397.
-
(1999)
LNCS 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
42
-
-
33846862428
-
Advances in Cryptology - Crypto
-
A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0, Springer-Verlag, Berlin
-
J. Manger, A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 230-238.
-
(2001)
LNCS
, vol.2139
, pp. 230-238
-
-
Manger, J.1
-
43
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Advances in Cryptology, Crypto '94, Springer-Verlag, Berlin
-
U. Maurer, Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms, Advances in Cryptology - Crypto '94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 271-281.
-
(1994)
LNCS
, vol.839
, pp. 271-281
-
-
Maurer, U.1
-
44
-
-
0032621240
-
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
-
U. Maurer and S. Wolf, The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms, SIAM J. Comput., 28(5) (1999), 1689-1731.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.5
, pp. 1689-1731
-
-
Maurer, U.1
Wolf, S.2
-
46
-
-
0023985474
-
The notion of security for probabilistic cryptosystems
-
S. Micali, C. Rackoff and B. Sloan, The notion of security for probabilistic cryptosystems, SIAM J. Comput., 17 (1988), 412-426.
-
(1988)
SIAM J. Comput
, vol.17
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
47
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi and S. Takano, New explicit conditions of elliptic curve traces for FR-reduction, IEICE-Trans. Fund. Election., Commun. Comput. Sci., E84-A(5) (2001), 1234-1243.
-
(2001)
IEICE-Trans. Fund. Election., Commun. Comput. Sci
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
48
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM, New York
-
M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proc. 22nd Annual Symp. Theory of Computing, ACM, New York, 1990, pp. 427-437.
-
(1990)
Proc. 22nd Annual Symp. Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
49
-
-
84927727752
-
Security proofs for signature schemes
-
Advances in Cryptology, Eurocrypt '96, Springer-Verlag, Berlin
-
D. Pointcheval and J. Stern, Security proofs for signature schemes, Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin, 1996, pp. 387-398.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
50
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, J. Cryptology, 13 (2000), 361-396.
-
(2000)
J. Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
51
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
Technical Report LCS/TR-212, MIT Lab. for Computer Science, 1979
-
M. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report LCS/TR-212, MIT Lab. for Computer Science, 1979.
-
-
-
Rabin, M.1
-
52
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Cryptology, Crypto '91, Springer-Verlag, Berlin
-
C. Rackoff and D. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, Advances in Cryptology - Crypto '91, LNCS 576, Springer-Verlag, Berlin, 1992, pp. 433-444.
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
53
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM, 21(2) (1978), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
55
-
-
12344258539
-
Efficient signature generation for smart cards
-
C. P. Schnorr, Efficient signature generation for smart cards, J. Cryptology, 4 (1991), 161-174.
-
(1991)
J. Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
56
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attack
-
Advances in Cryptology, Eurocrypt 2000, Springer-Verlag, Berlin
-
V. Shoup, Using hash functions as a hedge against chosen ciphertext attack, Advances in Cryptology - Eurocrypt 2000, LNCS 1807, Springer-Verlag, Berlin, 2000, pp. 275-288.
-
(2000)
LNCS
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
57
-
-
84880904783
-
Advances in Cryptology - Crypto 2001
-
Springer-Verlag, Berlin
-
V. Shoup, OAEP reconsidered, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 239-259.
-
(2001)
LNCS
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
reconsidered, O.A.E.P.2
-
58
-
-
35248867842
-
Why provable security matters
-
Advances in Cryptology, Eurocrypt 2003, Springer-Verlag, Berlin
-
J. Stern, Why provable security matters, Advances in Cryptology - Eurocrypt 2003, LNCS 2656, Springer-Verlag, Berlin, 2003, pp. 449-461.
-
(2003)
LNCS
, vol.2656
, pp. 449-461
-
-
Stern, J.1
-
59
-
-
84937411969
-
Flaws in applying proof methodologies to signature schemes
-
Advances in Cryptology, Crypto 2002, Springer- Verlag, Berlin
-
J. Stern, D. Pointcheval, J. Malone-Lee and N. Smart, Flaws in applying proof methodologies to signature schemes, Advances in Cryptology - Crypto 2002, LNCS 2442, Springer- Verlag, Berlin, 2002, pp. 93-110.
-
(2002)
LNCS
, vol.2442
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Malone-Lee, J.3
Smart, N.4
-
60
-
-
0000674810
-
Ring-theoretic properties of certain Hecke algebras
-
R. Taylor and A. Wiles, Ring-theoretic properties of certain Hecke algebras, Ann. of Math., 141 (1995), 553-572.
-
(1995)
Ann. of Math
, vol.141
, pp. 553-572
-
-
Taylor, R.1
Wiles, A.2
-
61
-
-
35248875140
-
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
-
Public Key Cryptography, PKC 2003, Springer-Verlag, Berlin
-
Y. Watanabe, J. Shikata and H. Imai, Equivalence between semantic security and indistinguishability against chosen ciphertext attacks, Public Key Cryptography - PKC 2003, LNCS 2567, Springer-Verlag, Berlin, 2003, pp. 71-84.
-
(2003)
LNCS
, vol.2567
, pp. 71-84
-
-
Watanabe, Y.1
Shikata, J.2
Imai, H.3
-
62
-
-
0000603921
-
Modular elliptic curves and Fermat's Last Theorem
-
A. Wiles, Modular elliptic curves and Fermat's Last Theorem, Ann. of Math., 141 (1995), 443-551.
-
(1995)
Ann. of Math
, vol.141
, pp. 443-551
-
-
Wiles, A.1
-
63
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
H. Williams, A modification of the RSA public-key encryption procedure, IEEE Trans. Inform. Theory, IT-26 (1980), 726-729.
-
(1980)
IEEE Trans. Inform. Theory
, vol.IT-26
, pp. 726-729
-
-
Williams, H.1
|