메뉴 건너뛰기




Volumn 3006, Issue , 2004, Pages 145-159

Authenticated on-line encryption

Author keywords

Authenticated encryption; Blockwise adversaries; Chosen ciphertext attacks; Provable security; Symmetric encryption

Indexed keywords

AUTHENTICATION; NUMBER THEORY; RANDOM NUMBER GENERATION; SECURITY OF DATA;

EID: 35048826668     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24654-1_11     Document Type: Article
Times cited : (24)

References (23)
  • 1
    • 84945121341 scopus 로고    scopus 로고
    • Does encryption with redundancy provide authenticity
    • B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, Springer-Verlag
    • J. H. An and M. Bellare. Does encryption with redundancy provide authenticity. In B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, volume 2045 of LNCS, pages 512 - 528. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 512-528
    • An, J.H.1    Bellare, M.2
  • 4
    • 84954417747 scopus 로고
    • XOR-MACs: New Methods for Message Authentication using Finite Pseudorandom Functions
    • D. Coppersmith, editor, Advances in Cryptology - Crypto'95, Springer-Verlag
    • M. Bellare, R. Guérin, and P. Rogaway. XOR-MACs: New Methods for Message Authentication using Finite Pseudorandom Functions. In D. Coppersmith, editor, Advances in Cryptology - Crypto'95, volume 963 of LNCS, pages 15 - 28. Springer-Verlag, 1995.
    • (1995) LNCS , vol.963 , pp. 15-28
    • Bellare, M.1    Guérin, R.2    Rogaway, P.3
  • 5
    • 84983089516 scopus 로고
    • The Security of the Cipher Block Chaining Message Authentication Code
    • Y. Desmedt, editor, Advances in Cryptology - Crypto'94, Springer-Verlag
    • M. Bellare, J. Kilian, and P. Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. In Y. Desmedt, editor, Advances in Cryptology - Crypto'94, volume 839 of LNCS, pages 341 - 358. Springer-Verlag, 1994.
    • (1994) LNCS , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 7
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
    • T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, Springer-Verlag
    • M. Bellare and C. Namprempre. Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, volume 1976 of LNCS, pages 531 - 545. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 8
    • 84937429718 scopus 로고    scopus 로고
    • Encode then encipher encryption: How to exploit nounces or redundancy in plaintexts for efficient cryptography
    • T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, Springer-Verlag
    • M. Bellare and P. Rogaway. Encode then encipher encryption: How to exploit nounces or redundancy in plaintexts for efficient cryptography. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, volume 1976 of LNCS, pages 317 - 330. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 84957651500 scopus 로고    scopus 로고
    • A Formal Treatment of Remotely Keyed Encryption
    • K. Nyberg, editor, Advances in Cryptology - Eurocrypt'98, Springer-Verlag
    • M. Blaze, J. Feigenbaum, and M. Naor. A Formal Treatment of Remotely Keyed Encryption. In K. Nyberg, editor, Advances in Cryptology - Eurocrypt'98, volume 1403 of LNCS, pages 251 - 265. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1403 , pp. 251-265
    • Blaze, M.1    Feigenbaum, J.2    Naor, M.3
  • 10
    • 84947295950 scopus 로고    scopus 로고
    • A Practice-Oriented Treatment of Pseudo-random Number Generators
    • L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
    • A. Desai, A. Hevia, and Y. L. Yin. A Practice-Oriented Treatment of Pseudo-random Number Generators. In L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, volume 2332 of LNCS, pages 368 - 383. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 368-383
    • Desai, A.1    Hevia, A.2    Yin, Y.L.3
  • 11
    • 35248852884 scopus 로고    scopus 로고
    • Cancelment and its Applications to Authenticated Encryption
    • E. Biham, editor, Advances in Cryptology - Eurocrypt'03, Springer-Verlag
    • Y. Dodis and J. H. An. Cancelment and its Applications to Authenticated Encryption. In E. Biham, editor, Advances in Cryptology - Eurocrypt'03, LNCS. Springer-Verlag, 2003.
    • (2003) LNCS
    • Dodis, Y.1    An, J.H.2
  • 12
    • 35048889989 scopus 로고    scopus 로고
    • Technical report, National Institute of Standards and Technologies
    • FIPS PUB 186-2. Digital Signature Standard. Technical report, National Institute of Standards and Technologies, 2001.
    • (2001) FIPS PUB 186-2. Digital Signature Standard
  • 14
    • 0242404221 scopus 로고    scopus 로고
    • Practical Symmetric On-line Encryption
    • T. Johansson, editor, Proceedings of the Fast Software Encryption Workshop 2003, Springer-Verlag
    • P.-A. Fouque, G. Martinet, and G. Poupard. Practical Symmetric On-line Encryption. In T. Johansson, editor, Proceedings of the Fast Software Encryption Workshop 2003, LNCS. Springer-Verlag, 2003.
    • (2003) LNCS
    • Fouque, P.-A.1    Martinet, G.2    Poupard, G.3
  • 15
    • 84889351757 scopus 로고    scopus 로고
    • How to Sign Digital Streams
    • B. Kaliski, editor, Advances in Cryptology - Crypto'97, Springer-Verlag
    • R. Gennaro and P. Rohatgi. How to Sign Digital Streams. In B. Kaliski, editor, Advances in Cryptology - Crypto'97, volume 1294 of LNCS, pages 180 - 197. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 180-197
    • Gennaro, R.1    Rohatgi, P.2
  • 17
    • 38149093714 scopus 로고    scopus 로고
    • Blockwise-Adaptive Attackers. Revisiting the (in)security of some provably secure Encryption Modes: CBC, GEM, IACBC
    • M. Yung, editor, Advances in Cryptology - Crypto'02, Springer-Verlag
    • A. Joux, G. Martinet, and F. Valette. Blockwise-Adaptive Attackers. Revisiting the (in)security of some provably secure Encryption Modes: CBC, GEM, IACBC. In M. Yung, editor, Advances in Cryptology - Crypto'02, volume 2442 of LNCS, pages 17 - 30. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 17-30
    • Joux, A.1    Martinet, G.2    Valette, F.3
  • 18
    • 84945137421 scopus 로고    scopus 로고
    • Encryption Modes with Almost Free Message Integrity
    • B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, Springer-Verlag
    • C. Jutla. Encryption Modes with Almost Free Message Integrity. In B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, volume 2045 of LNCS, pages 529 - 544. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 529-544
    • Jutla, C.1
  • 19
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
    • B. Schneier, editor, Proceedings of the Fast Software Encryption Workshop 2000, Springer-Verlag
    • J. Katz and M. Yung. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. In B. Schneier, editor, Proceedings of the Fast Software Encryption Workshop 2000, volume 1978 of LNCS, pages 284 - 299. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1978 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 20
    • 0004775324 scopus 로고    scopus 로고
    • CBC-MAC for Real-Time Data Sources
    • E. Petrank and C. Rackoff. CBC-MAC for Real-Time Data Sources. Journal of Cryptology, 13(3):315 - 338, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 315-338
    • Petrank, E.1    Rackoff, C.2
  • 22
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • (Extended Abstract). In J. Kilian, editor, Advances in Cryptology - Crypto'01, Springer-Verlag
    • V. Shoup. OAEP reconsidered (Extended Abstract). In J. Kilian, editor, Advances in Cryptology - Crypto'01, volume 2139 of LNCS, pages 239 - 259. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 239-259
    • Shoup, V.1
  • 23
    • 84947212539 scopus 로고    scopus 로고
    • CBC Padding: Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS,⋯
    • L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
    • S. Vaudenay. CBC Padding: Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS,⋯ In L. Knudsen, editor, Advances in Cryptology - Eurocrypt 2002, volume 2332 of LNCS, pages 534 - 545. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 534-545
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.