-
1
-
-
0022716288
-
A simple secure unpredictable unpredictable pseudo-random number generator
-
L. Blum, M. Blum, and M. Shub. A simple secure unpredictable unpredictable pseudo-random number generator. SIAM J. on Computing, vol. 15, pp. 364-383, 1986.
-
(1986)
SIAM J. on Computing
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
2
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge. JCSS, vol. 37, no. 2, pp. 156-189, 1988.
-
(1988)
JCSS
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
Crypto '96, Springer
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Crypto '96, LNCS vol. 1109, Springer, 1996.
-
(1996)
LNCS
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
24944468450
-
A concrete security treatment of symmetric encryption: Analysis of the des modes of operation
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: analysis of the DES modes of operation. FOCS 1997, 1997.
-
(1997)
FOCS 1997
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Crypto '98, Springer
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. Crypto '98, LNCS vol. 1462, Springer, 1998.
-
(1998)
LNCS
, vol.1462
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating faulty minority. J. of Cryptology, vol. 4, no. 2, pp. 75-122, 1991.
-
(1991)
J. of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
7
-
-
0010254147
-
Practice-oriented provable security
-
Lectures on Data Security 1998
-
M. Bellare. Practice-oriented provable security. Lectures on Data Security 1998, LNCS vol. 1561, pp. 1-15, 1999.
-
(1999)
LNCS
, vol.1561
, pp. 1-15
-
-
Bellare, M.1
-
8
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM Press
-
M. Ben-or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. STOC 1988, ACM Press, pp. 1-10, 1988.
-
(1988)
STOC 1988
, pp. 1-10
-
-
Ben-or, M.1
Goldwasser, S.2
Wigderson, A.3
-
9
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. JCSS, vol. 61, no. 3, pp. 262-399, 2000.
-
(2000)
JCSS
, vol.61
, Issue.3
, pp. 262-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
10
-
-
0003030602
-
Coin flipping by phone
-
M. Blum. Coin flipping by phone. IEEE Spring COMPCOM, pp. 133-137, 1982.
-
(1982)
IEEE Spring COMPCOM
, pp. 133-137
-
-
Blum, M.1
-
11
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. on Computing, vol. 13, no. 4, pp. 850-864, 1984.
-
(1984)
SIAM J. on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
12
-
-
35048903093
-
-
Earlier version
-
Earlier version in FOCS 1982.
-
FOCS 1982
-
-
-
13
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Asiacrypt '00, Springer
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Asiacrypt '00, LNCS vol. 1976, Springer, pp. 531-545, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
14
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology - Eurocrypt '00. Springer
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology - Eurocrypt '00. LNCS vol. 1807, Springer, 2000.
-
(2000)
LNCS
, vol.1807
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
15
-
-
35048865313
-
Secure asynchronous reactive systems
-
Cryptology ePrint report 2004/082, 2004. Earlier version by Pfitzmann and Waidner
-
M. Backes, B. Pfitzmann, and M. Waidner. Secure asynchronous reactive systems. Cryptology ePrint report 2004/082, 2004. Earlier version by Pfitzmann and Waidner in IEEE Symposium on Security and Privacy, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
17
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption
-
Asiacrypt '00, Springer
-
M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption. Asiacrypt '00, LNCS vol. 1976, Springer, pp. 317-330, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
84945119254
-
Entity authentication and key distribution
-
Crypto '93. Springer
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. Crypto '93. LNCS vol. 773, pp. 232-249, Springer, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
M. Bellare and P. Rogaway. Provably secure session key distribution: the three party case. STOC 1995, pp. 57-66, 1995.
-
(1995)
STOC 1995
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
21
-
-
0028087488
-
Receipt-free secret ballot elections
-
J. Benaloh and D. Tuinstra. Receipt-free secret ballot elections. STOC 1994, pp. 544-553, 1994.
-
(1994)
STOC 1994
, pp. 544-553
-
-
Benaloh, J.1
Tuinstra, D.2
-
22
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Cryptology ePrint report 2000/67, 2001. Earlier version
-
R. Canetti. Universally composable security: a new paradigm for cryptographic protocols. Cryptology ePrint report 2000/67, 2001. Earlier version in FOCS 2001.
-
FOCS 2001
-
-
Canetti, R.1
-
23
-
-
26444548230
-
On session identifiers in provably secure protocols, the Bellare-Rogaway three-party key distribution protocol revisited
-
Security in Communication Networks '04, Springer
-
K. Choo, C. Boyd, Y. Hitchcock, and G. Maitland. On session identifiers in provably secure protocols, the Bellare-Rogaway three-party key distribution protocol revisited. Security in Communication Networks '04, LNCS, Springer, 2004.
-
(2004)
LNCS
-
-
Choo, K.1
Boyd, C.2
Hitchcock, Y.3
Maitland, G.4
-
25
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Eurocrypt '02, Springer
-
R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. Eurocrypt '02, LNCS vol. 2332, pp. 337-351, Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
26
-
-
85059770931
-
The complexity of theorem-proving procedures
-
ACM Press
-
S. Cook. The complexity of theorem-proving procedures. STOC 1971, ACM Press, pp. 151-158, 1971.
-
(1971)
STOC 1971
, pp. 151-158
-
-
Cook, S.1
-
28
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. on Inf. Th., vol. 22, pp. 644-654, 1976.
-
(1976)
IEEE Trans. on Inf. Th.
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
29
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, vol. 29, no. 12, pp. 198-208, 1983.
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
30
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Crypto '86, Springer
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. Crypto '86, LNCS vol. 263, pp. 186-194, Springer, 1986.
-
(1986)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
31
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions, JACM, vol. 33, no. 4, 210-217, 1986.
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
32
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, vol. 28, pp. 270-299, 1984.
-
(1984)
JCSS
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
33
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. on Computing, vol. 18, no. 1, pp. 186-208, 1989.
-
(1989)
SIAM J. on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
34
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. on Computing, vol. 17, no. 2, pp. 281-308, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
35
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. STOC 1987, pp. 218-229, 1997.
-
(1997)
STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
36
-
-
33744473008
-
The foundations of modern cryptography
-
Manuscript, Available from Goldreich's webpage. Earlier version in
-
O. Goldreich. The foundations of modern cryptography. Manuscript, 2000. Available from Goldreich's webpage. Earlier version in Crypto 97.
-
(2000)
Crypto 97
-
-
Goldreich, O.1
-
38
-
-
84945137421
-
Encryption modes with almost free message integrity
-
Eurocrypt '01, Springer
-
C. JUTLA. Encryption modes with almost free message integrity. Eurocrypt '01, LNCS vol. 2045, Springer, pp. 529-544, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 529-544
-
-
Jutla, C.1
-
39
-
-
84974720881
-
Unforgeable encryption and adaptively secure modes of operation
-
Fast Software Encryption, FSE 2000. Springer
-
J. Katz and M. Yung. Unforgeable encryption and adaptively secure modes of operation. Fast Software Encryption, FSE 2000. LNCS vol. 1978, Springer, pp. 284-299, 2000.
-
(2000)
LNCS
, vol.1978
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
40
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. on Computing, vol. 17, no. 2, April 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
41
-
-
35048852134
-
Physically observable cryptography
-
TCC 2004, Springer, Cryptology ePrint report 2003/120
-
S. Micali and L. Reyzin. Physically observable cryptography. TCC 2004, LNCS vol. 2951, Springer, pp. 278-296, 2004. Cryptology ePrint report 2003/120.
-
(2004)
LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
42
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC 1989, pp. 33-43, 1989.
-
(1989)
STOC 1989
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
43
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
P. ROGAWAY, M. BELLARE, and J. BLACK. OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 3, pp. 365-403, 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
44
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
47
-
-
0020301290
-
Theory and applications of trapdoor functions
-
A. Yao. Theory and applications of trapdoor functions. FOCS 1982, pp. 80-91, 1982.
-
(1982)
FOCS 1982
, pp. 80-91
-
-
Yao, A.1
|