-
2
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
Progress in Oryptology - CT-RSA 2001 D. Naccache, Ed.
-
ABDALLA, M., BELLARE, M., AND ROGAWAY, P. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In Progress in Oryptology - CT-RSA 2001 (2001), D. Naccache, Ed., vol. 2020 of Lecture Notes in Computer Science, pp. 143-158.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology - CRYPTO '96 N. Koblitz, Ed.
-
BELLARE, M., CANETTI, R., AND KRAWCZYK, H. Keying hash functions for message authentication. In Advances in Cryptology - CRYPTO '96 (1996), N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science, pp. 1-15.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society
-
BELLARE, M., DESAI, A., JOKIPII, E., AND ROGAWAY, P. A concrete security treatment of symmetric encryption. In 38th Annual Symposium on Foundations of Computer Science (FOCS '97) (1997), IEEE Computer Society, pp. 394-403.
-
(1997)
38th Annual Symposium on Foundations of Computer Science (FOCS '97)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Advances in Cryptology - CRYPTO '99 M. Wiener, Ed.
-
BLACK, J., HALEVI, S., KRAWCZYK, H., KROVETZ, T., AND ROGAWAY, P. UMAC: Fast and secure message authentication. In Advances in Cryptology - CRYPTO '99 (1999), M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science, pp. 216-233.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
0017018484
-
New directions in cryptography
-
DIFFIE, W., AND HELLMAN, M. E. New directions in cryptography. IEEE Transactions on Information Theory 22, 6 (1976), 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
13
-
-
84855630085
-
-
LIPMAA, H., ROGAWAY, P., AND WAGNER, D. Comments to NIST concerning AES modes of operation: CTR-mode encryption, http://csrc.nist.gov/ encryption/modes/workshopl/papers/lipmaa-ctr.pdf, 2000.
-
(2000)
Comments to NIST Concerning AES Modes of Operation: CTR-mode Encryption
-
-
Lipmaa, H.1
Rogaway, P.2
Wagner, D.3
-
14
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology - CRYPTO '85 H. C. Williams, Ed.
-
MILLER, V. S. Use of elliptic curves in cryptography. In Advances in Cryptology - CRYPTO '85 (1986), H. C. Williams, Ed., vol. 218 of Lecture Notes in Computer Science, pp. 417-428.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-428
-
-
Miller, V.S.1
-
17
-
-
84937415944
-
A length-invariant hybrid mix
-
Advances in Cryptology - ASIACRYPT 2000 T. Okamoto, Ed.
-
OHKUBO, M., AND ABE, M. A length-invariant hybrid mix. In Advances in Cryptology - ASIACRYPT 2000 (2000), T. Okamoto, Ed., vol. 1976 of Lecture Notes in Computer Science, pp. 178-191.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 178-191
-
-
Ohkubo, M.1
Abe, M.2
-
18
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Cryptology - CRYPTO '91 J. Feigenbaum, Ed.
-
RACKOFF, C. W., AND SIMON, D. R. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology - CRYPTO '91 (1992), J. Feigenbaum, Ed., vol. 576 of Lecture Notes in Computer Science, pp. 433-444.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.W.1
Simon, D.R.2
-
20
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
WEGMAN, M. N., AND CARTER, J. L. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22 (1981), 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|