메뉴 건너뛰기




Volumn 2576, Issue , 2003, Pages 55-73

On the power of claw-free permutations

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35248859171     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36413-7_5     Document Type: Article
Times cited : (27)

References (24)
  • 2
    • 84969361839 scopus 로고    scopus 로고
    • How to sign given any trapdoor function
    • Gol88
    • Mihir Bellare and Silvio Micali. How to sign given any trapdoor function. In Goldwasser [Gol88], pages 200-215.
    • Goldwasser , pp. 200-215
    • Bellare, M.1    Micali, S.2
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • November Revised version
    • Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communication Security, pages 62-73, November 1993. Revised version available from http://www.cs.ucsd.edu/~mihir/.
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communication Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures: How to sign with RSA and Rabin
    • Ueli Maurer, editor, Advances in Cryptology - EUROCRYPT 96, Springer-Verlag, 12-16 May 1996. Revised version appears in
    • Mihir Bellare and Phillip Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. In Ueli Maurer, editor, Advances in Cryptology - EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer-Verlag, 12-16 May 1996. Revised version appears in http://www-cse.ucsd.edu/users/mihir/papers/crypto-papers.html.
    • Lecture Notes in Computer Science , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, Springer-Verlag, 20-24 August
    • Jean-Sébastian Coron. On the exact security of full domain hash. In Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 229-235. Springer-Verlag, 20-24 August 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 6
    • 84947215491 scopus 로고    scopus 로고
    • Optimal security proofs for PSS and other signature schemes
    • Lars Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag, 28 April-2 May
    • Jean-Sébastian Coron. Optimal security proofs for PSS and other signature schemes. In Lars Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 272-287. Springer-Verlag, 28 April-2 May 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 272-287
    • Coron, J.-S.1
  • 7
    • 85028868533 scopus 로고
    • Collision-free hash functions and public-key signature schemes
    • David Chaum and Wyn L. Price, editors, Advances in Cryptology - EUROCRYPT 87, Springer-Verlag, 13-15 April 1987
    • Ivan Damgård. Collision-free hash functions and public-key signature schemes. In David Chaum and Wyn L. Price, editors, Advances in Cryptology - EUROCRYPT 87, volume 304 of Lecture Notes in Computer Science. Springer-Verlag, 1988, 13-15 April 1987.
    • (1988) Lecture Notes in Computer Science , vol.304
    • Damgård, I.1
  • 8
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, Springer-Verlag, 11-15 August 1986
    • Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987, 11-15 August 1986.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 9
    • 35248860993 scopus 로고    scopus 로고
    • Technical Report 2002-22, DIMACS: Center for Discrete Mathematics and Theoretical Computer Science
    • Rosario Gennaro, Yael Gertner, and Jonathan Katz. Bounds on the efficiency of encryption and digital signatures. Technical Report 2002-22, DIMACS: Center for Discrete Mathematics and Theoretical Computer Science, 2002. Available from http://dimacs.rutgers.edu/TechnicalReports/2002.html.
    • (2002) Bounds on the Efficiency of Encryption and Digital Signatures
    • Gennaro, R.1    Gertner, Y.2    Katz, J.3
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 12
    • 0000966673 scopus 로고
    • Advances in Cryptology - CRYPTO '88
    • Shafi Goldwasser, editor. Springer-Verlag, 21-25 August 1988
    • Shafi Goldwasser, editor. Advances in Cryptology - CRYPTO '88, volume 403 of Lecture Notes in Computer Science. Springer-Verlag, 1990, 21-25 August 1988.
    • (1990) Lecture Notes in Computer Science , vol.403
  • 13
    • 84947558992 scopus 로고    scopus 로고
    • A "paradoxical" indentity-based signature scheme resulting from zero-knowledge
    • Gol88
    • Louis Claude Guillou and Jean-Jacques Quisquater. A "paradoxical" indentity-based signature scheme resulting from zero-knowledge. In Goldwasser [Gol88], pages 216-231.
    • Goldwasser , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 14
    • 0034496969 scopus 로고    scopus 로고
    • Lower bounds on the efficiency of generic cryptographic constructions
    • Redondo Beach, California, November IEEE
    • Rosario Gennaro and Luca Trevisan. Lower bounds on the efficiency of generic cryptographic constructions. In 41st Annual Symposium on Foundations of Computer Science, Redondo Beach, California, November 2000. IEEE.
    • (2000) 41st Annual Symposium on Foundations of Computer Science
    • Gennaro, R.1    Trevisan, L.2
  • 15
    • 0024866742 scopus 로고    scopus 로고
    • Limits on the provable consequences of one-way permutations
    • ACM89
    • Russell Impagliazzo and Steven Rudich. Limits on the provable consequences of one-way permutations. In ACM [ACM89], pages 44-61.
    • ACM , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 18
    • 33746441852 scopus 로고
    • Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March
    • Silvio Micali. A secure and efficient digital signature algorithm. Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March 1994.
    • (1994) A Secure and Efficient Digital Signature Algorithm
    • Micali, S.1
  • 19
    • 0344839013 scopus 로고    scopus 로고
    • Improving the exact security of digital signature schemes
    • Silvio Micali and Leonid Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, 15:1-18, 2002.
    • (2002) Journal of Cryptology , vol.15 , pp. 1-18
    • Micali, S.1    Reyzin, L.2
  • 20
    • 0024867751 scopus 로고    scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM89
    • Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In ACM [ACM89], pages 33-43.
    • ACM , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 21
    • 33745972475 scopus 로고
    • Fast signature generation with a Fiat Shamir-like scheme
    • I. B. Damgård, editor, Advances in Cryptology - EUROCRYPT 90, Springer-Verlag, 21-24 May 1990
    • Heidroon Ong and Claus P. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In I. B. Damgård, editor, Advances in Cryptology - EUROCRYPT 90, volume 473 of Lecture Notes in Computer Science, pages 432-440. Springer-Verlag, 1991, 21-24 May 1990.
    • (1991) Lecture Notes in Computer Science , vol.473 , pp. 432-440
    • Ong, H.1    Schnorr, C.P.2
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, Springer-Verlag, 2-6 May
    • Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science. Springer-Verlag, 2-6 May 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592
    • Paillier, P.1
  • 23
  • 24
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions
    • Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT 98, Springer-Verlag, May 31-June 4
    • Daniel R. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT 98, volume 1403 of Lecture Notes in Computer Science. Springer-Verlag, May 31-June 4 1998.
    • (1998) Lecture Notes in Computer Science , vol.1403
    • Simon, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.