메뉴 건너뛰기




Volumn 2595, Issue , 2003, Pages 76-93

On the security of CTR + CBC-MAC

(1)  Jonsson, Jakob a  

a NONE

Author keywords

AES; Authenticated encryption; Modes of operation

Indexed keywords

AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; STANDARDS;

EID: 35248857083     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36492-7_7     Document Type: Article
Times cited : (39)

References (28)
  • 1
    • 84945121341 scopus 로고    scopus 로고
    • Does Encryption with Redundancy Provide Authenticity?
    • Springer Verlag
    • J. H. An and M. Bellare. Does Encryption with Redundancy Provide Authenticity? Advances in Cryptology - EUROCRYPT 2001, pp. 512 - 528, Springer Verlag, 2001.
    • (2001) Advances in Cryptology - EUROCRYPT 2001 , pp. 512-528
    • An, J.H.1    Bellare, M.2
  • 3
    • 85032128552 scopus 로고    scopus 로고
    • The Security of the Cipher Block Chaining Message Authentication Code
    • M. Bellare, J. Kilian, P. Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences, 61 (3), 362 - 399, 2000.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 4
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • Springer-Verlag
    • M. Bellare and C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. Advances in Cryptology - ASIACRYPT 2000, pp. 531-545, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 0001868672 scopus 로고
    • Optimal Asymmetric Encryption - How to Encrypt with RSA
    • Springer Verlag
    • M. Bellare and P. Rogaway. Optimal Asymmetric Encryption - How to Encrypt with RSA. Advances in Cryptology - Eurocrypt '94, pp. 92-111, Springer Verlag, 1994.
    • (1994) Advances in Cryptology - Eurocrypt '94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84937429718 scopus 로고    scopus 로고
    • Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Encryption
    • Springer-Verlag
    • M. Bellare and P. Rogaway. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Encryption. Advances in Cryptology - ASIACRYPT 2000, pp. 317-330, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0004181422 scopus 로고    scopus 로고
    • Contribution to NIST, September
    • J. Daemen and V. Rijmen. AES Proposal: Rijndael. Contribution to NIST, September 1999. Available from csrc.nist.gov/encryption/aes/rijndael/.
    • (1999) AES Proposal: Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 8
    • 0018443381 scopus 로고
    • Privacy and Authentication: An Introduction to Cryptography
    • W. Diffie and M. Hellman. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE, 67, pp. 397-427, 1979.
    • (1979) Proceedings of the IEEE , vol.67 , pp. 397-427
    • Diffie, W.1    Hellman, M.2
  • 11
    • 4043055208 scopus 로고    scopus 로고
    • Contribution to the NESSIE project
    • H. Handschuh and D. Naccache. SHACAL. Contribution to the NESSIE project, 2000.
    • (2000) SHACAL
    • Handschuh, H.1    Naccache, D.2
  • 17
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation
    • J. Katz and M. Yung. Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation. Fast Software Encryption 2000, pp. 284-299, 2000.
    • (2000) Fast Software Encryption 2000 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 18
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
    • Springer Verlag
    • H. Krawczyk. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Advances in Cryptology - CRYPTO 2001, pp. 310-331, Springer Verlag, 2001.
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 310-331
    • Krawczyk, H.1
  • 24
    • 0004775324 scopus 로고    scopus 로고
    • CBC MAC for Real-Time Data Sources
    • E. Petrank, C. Rackoff. CBC MAC for Real-Time Data Sources. Journal of Cryptology, 13 (3), pp. 315-338, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 315-338
    • Petrank, E.1    Rackoff, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.