메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 503-516

Concrete security characterizations of PRFs and PRPs: Reductions and applications

Author keywords

[No Author keywords available]

Indexed keywords

POLYNOMIAL APPROXIMATION; SECURITY OF DATA;

EID: 35048841016     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_39     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 4
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using finite pseudorandom functions
    • D. Coppersmith ed., Springer-Verlag
    • M. Bellare, R. Guérin and P. Rogaway, “XOR MACs: New methods for message authentication using finite pseudorandom functions,” Advances in Cryptology - Crypto ’95, LNCS Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
    • (1995) Advances in Cryptology - Crypto ’95, LNCS , vol.963
    • Bellare, M.1    Guérin, R.2    Rogaway, P.3
  • 5
    • 84983089516 scopus 로고
    • The security of the cipher block chaining message authentication code
    • Y. Desmedt ed., Springer-Verlag
    • M. Bellare, J. Kilian and P. Rogaway, “The security of the cipher block chaining message authentication code,” Advances in Cryptology - Crypto ’94, LNCS Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - Crypto ’94, LNCS , vol.839
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 7
    • 84937488219 scopus 로고    scopus 로고
    • Concrete security characterizations of PRFs and PRPs: Reductions and applications
    • A. Desai and S. Miner, “Concrete security characterizations of PRFs and PRPs: Reductions and applications,” Full version of this paper, available via: http://www-cse.ucsd.edu/users/sminer/.
    • Full Version of This Paper
    • Desai, A.1    Miner, S.2
  • 10
    • 0023985465 scopus 로고
    • A digital signature signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali and R. Rivest, “A digital signature signature scheme secure against adaptive chosen-message attacks,” SIAM J. of Computing, 17(2): 281-308, April 1988.
    • (1988) SIAM J. Of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff, “How to construct pseudorandom permutations from pseudorandom functions,” SIAM J. Computing, 17(2), April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 12
    • 84957617971 scopus 로고    scopus 로고
    • From unpredictability to indistinguishability: A simple construction of PRFs from MACs
    • H. Krawczyk ed., Springer-Verlag
    • M. Naor and O. Reingold, “From unpredictability to indistinguishability: A simple construction of PRFs from MACs,” Advances in Cryptology - Crypto ’98, LNCS Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - Crypto ’98, LNCS , vol.1462
    • Naor, M.1    Reingold, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.