메뉴 건너뛰기




Volumn 3321, Issue , 2004, Pages 13-32

On the role definitions in and beyond cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; DECISION MAKING;

EID: 35048852068     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30502-6_2     Document Type: Article
Times cited : (20)

References (47)
  • 1
    • 0022716288 scopus 로고
    • A simple secure unpredictable unpredictable pseudo-random number generator
    • L. Blum, M. Blum, and M. Shub. A simple secure unpredictable unpredictable pseudo-random number generator. SIAM J. on Computing, vol. 15, pp. 364-383, 1986.
    • (1986) SIAM J. on Computing , vol.15 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 2
    • 0000867507 scopus 로고
    • Minimum disclosure proofs of knowledge
    • G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge. JCSS, vol. 37, no. 2, pp. 156-189, 1988.
    • (1988) JCSS , vol.37 , Issue.2 , pp. 156-189
    • Brassard, G.1    Chaum, D.2    Crépeau, C.3
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Crypto '96, Springer
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Crypto '96, LNCS vol. 1109, Springer, 1996.
    • (1996) LNCS , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 24944468450 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption: Analysis of the des modes of operation
    • M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: analysis of the DES modes of operation. FOCS 1997, 1997.
    • (1997) FOCS 1997
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 5
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Crypto '98, Springer
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. Crypto '98, LNCS vol. 1462, Springer, 1998.
    • (1998) LNCS , vol.1462
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating faulty minority. J. of Cryptology, vol. 4, no. 2, pp. 75-122, 1991.
    • (1991) J. of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 7
    • 0010254147 scopus 로고    scopus 로고
    • Practice-oriented provable security
    • Lectures on Data Security 1998
    • M. Bellare. Practice-oriented provable security. Lectures on Data Security 1998, LNCS vol. 1561, pp. 1-15, 1999.
    • (1999) LNCS , vol.1561 , pp. 1-15
    • Bellare, M.1
  • 8
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • ACM Press
    • M. Ben-or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. STOC 1988, ACM Press, pp. 1-10, 1988.
    • (1988) STOC 1988 , pp. 1-10
    • Ben-or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 9
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. JCSS, vol. 61, no. 3, pp. 262-399, 2000.
    • (2000) JCSS , vol.61 , Issue.3 , pp. 262-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 10
    • 0003030602 scopus 로고
    • Coin flipping by phone
    • M. Blum. Coin flipping by phone. IEEE Spring COMPCOM, pp. 133-137, 1982.
    • (1982) IEEE Spring COMPCOM , pp. 133-137
    • Blum, M.1
  • 11
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. on Computing, vol. 13, no. 4, pp. 850-864, 1984.
    • (1984) SIAM J. on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 12
    • 35048903093 scopus 로고    scopus 로고
    • Earlier version
    • Earlier version in FOCS 1982.
    • FOCS 1982
  • 13
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Asiacrypt '00, Springer
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Asiacrypt '00, LNCS vol. 1976, Springer, pp. 531-545, 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 14
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology - Eurocrypt '00. Springer
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology - Eurocrypt '00. LNCS vol. 1807, Springer, 2000.
    • (2000) LNCS , vol.1807
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 15
    • 35048865313 scopus 로고    scopus 로고
    • Secure asynchronous reactive systems
    • Cryptology ePrint report 2004/082, 2004. Earlier version by Pfitzmann and Waidner
    • M. Backes, B. Pfitzmann, and M. Waidner. Secure asynchronous reactive systems. Cryptology ePrint report 2004/082, 2004. Earlier version by Pfitzmann and Waidner in IEEE Symposium on Security and Privacy, 2001.
    • (2001) IEEE Symposium on Security and Privacy
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 17
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption
    • Asiacrypt '00, Springer
    • M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption. Asiacrypt '00, LNCS vol. 1976, Springer, pp. 317-330, 2000.
    • (2000) LNCS , vol.1976 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 18
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Crypto '93. Springer
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. Crypto '93. LNCS vol. 773, pp. 232-249, Springer, 1994.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 19
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • M. Bellare and P. Rogaway. Provably secure session key distribution: the three party case. STOC 1995, pp. 57-66, 1995.
    • (1995) STOC 1995 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 21
    • 0028087488 scopus 로고
    • Receipt-free secret ballot elections
    • J. Benaloh and D. Tuinstra. Receipt-free secret ballot elections. STOC 1994, pp. 544-553, 1994.
    • (1994) STOC 1994 , pp. 544-553
    • Benaloh, J.1    Tuinstra, D.2
  • 22
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Cryptology ePrint report 2000/67, 2001. Earlier version
    • R. Canetti. Universally composable security: a new paradigm for cryptographic protocols. Cryptology ePrint report 2000/67, 2001. Earlier version in FOCS 2001.
    • FOCS 2001
    • Canetti, R.1
  • 23
    • 26444548230 scopus 로고    scopus 로고
    • On session identifiers in provably secure protocols, the Bellare-Rogaway three-party key distribution protocol revisited
    • Security in Communication Networks '04, Springer
    • K. Choo, C. Boyd, Y. Hitchcock, and G. Maitland. On session identifiers in provably secure protocols, the Bellare-Rogaway three-party key distribution protocol revisited. Security in Communication Networks '04, LNCS, Springer, 2004.
    • (2004) LNCS
    • Choo, K.1    Boyd, C.2    Hitchcock, Y.3    Maitland, G.4
  • 24
    • 0031619016 scopus 로고    scopus 로고
    • The random oracle methodology
    • revisited
    • R. Canetti, O. Goldreich, and H. Krawczyk. The random oracle methodology, revisited. STOC 1998, pp. 209-218, 1998.
    • (1998) STOC 1998 , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Krawczyk, H.3
  • 25
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Eurocrypt '02, Springer
    • R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. Eurocrypt '02, LNCS vol. 2332, pp. 337-351, Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 26
    • 85059770931 scopus 로고
    • The complexity of theorem-proving procedures
    • ACM Press
    • S. Cook. The complexity of theorem-proving procedures. STOC 1971, ACM Press, pp. 151-158, 1971.
    • (1971) STOC 1971 , pp. 151-158
    • Cook, S.1
  • 28
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. on Inf. Th., vol. 22, pp. 644-654, 1976.
    • (1976) IEEE Trans. on Inf. Th. , vol.22 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 29
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, vol. 29, no. 12, pp. 198-208, 1983.
    • (1983) IEEE Trans. on Information Theory , vol.29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 30
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Crypto '86, Springer
    • A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. Crypto '86, LNCS vol. 263, pp. 186-194, Springer, 1986.
    • (1986) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 31
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions, JACM, vol. 33, no. 4, 210-217, 1986.
    • (1986) JACM , vol.33 , Issue.4 , pp. 210-217
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 32
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, vol. 28, pp. 270-299, 1984.
    • (1984) JCSS , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 33
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. on Computing, vol. 18, no. 1, pp. 186-208, 1989.
    • (1989) SIAM J. on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 34
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. on Computing, vol. 17, no. 2, pp. 281-308, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 35
    • 0023545076 scopus 로고    scopus 로고
    • How to play any mental game, or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. STOC 1987, pp. 218-229, 1997.
    • (1997) STOC 1987 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 36
    • 33744473008 scopus 로고    scopus 로고
    • The foundations of modern cryptography
    • Manuscript, Available from Goldreich's webpage. Earlier version in
    • O. Goldreich. The foundations of modern cryptography. Manuscript, 2000. Available from Goldreich's webpage. Earlier version in Crypto 97.
    • (2000) Crypto 97
    • Goldreich, O.1
  • 38
    • 84945137421 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • Eurocrypt '01, Springer
    • C. JUTLA. Encryption modes with almost free message integrity. Eurocrypt '01, LNCS vol. 2045, Springer, pp. 529-544, 2001.
    • (2001) LNCS , vol.2045 , pp. 529-544
    • Jutla, C.1
  • 39
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable encryption and adaptively secure modes of operation
    • Fast Software Encryption, FSE 2000. Springer
    • J. Katz and M. Yung. Unforgeable encryption and adaptively secure modes of operation. Fast Software Encryption, FSE 2000. LNCS vol. 1978, Springer, pp. 284-299, 2000.
    • (2000) LNCS , vol.1978 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 40
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. on Computing, vol. 17, no. 2, April 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 41
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • TCC 2004, Springer, Cryptology ePrint report 2003/120
    • S. Micali and L. Reyzin. Physically observable cryptography. TCC 2004, LNCS vol. 2951, Springer, pp. 278-296, 2004. Cryptology ePrint report 2003/120.
    • (2004) LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 42
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC 1989, pp. 33-43, 1989.
    • (1989) STOC 1989 , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 44
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.1
  • 47
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • A. Yao. Theory and applications of trapdoor functions. FOCS 1982, pp. 80-91, 1982.
    • (1982) FOCS 1982 , pp. 80-91
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.