-
3
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 232-249. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 232-249
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
7
-
-
84974716098
-
Mercy: A fast large block cipher for disk sector encryption
-
B. Schneier,-editor, Fast Software Encryption: 7th International Workshop, New York, USA, Apr. Springer-Verlag
-
P. Crowley. Mercy: A fast large block cipher for disk sector encryption. In B. Schneier,-editor, Fast Software Encryption: 7th International Workshop, volume 1978 of Lecture Notes in Computer Science, pages 49-63, New York, USA, Apr. 2000. Springer-Verlag, www.ciphergoth.org/crypto/mercy.
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 49-63
-
-
Crowley, P.1
-
8
-
-
0343337504
-
Non-malleable cryptography
-
Earlier version in STOC 91
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000. Earlier version in STOC 91.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
11
-
-
35248852905
-
-
Working group homepage at Call for algorithms can be found at www.mail-archive.eom/cryptography@wasabisystems.com/msg02102.html, May
-
J. Hughes. Chair of the IEEE Security in Storage Working Group. Working group homepage at www.siswg.org. Call for algorithms can be found at www.mail-archive.eom/cryptography@wasabisystems.com/msg02102.html, May 2002.
-
(2002)
-
-
Hughes, J.1
-
12
-
-
24944472877
-
Cryptanalysis of the EMD mode of operation
-
Advances in Cryptology - EUROCRYPT '03, Springer-Verlag
-
A. Joux. Cryptanalysis of the EMD mode of operation. In Advances in Cryptology - EUROCRYPT '03, volume 2656 of Lecture Notes in Computer Science. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
-
-
Joux, A.1
-
15
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. of Computation, 17(2), April 1988.
-
(1988)
SIAM J. of Computation
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
19
-
-
24944526441
-
The EMD mode of operation (a tweaked, wide-blocksize, strong PRP)
-
Report 2002/148, Oct. Early (buggy) version of the CMC algorithm
-
P. Rogaway. The EMD mode of operation (a tweaked, wide-blocksize, strong PRP). Cryptology ePrint Archive, Report 2002/148, Oct. 2002. Early (buggy) version of the CMC algorithm. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive
-
-
Rogaway, P.1
-
21
-
-
85032866581
-
On the construction of block ciphers provably secure and not relying on any unproved hypotheses
-
Advances in Cryptology - CRYPTO '89, Springer-Verlag
-
Y. Zheng, T. Matsumoto, and H. Imai. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 461-480. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 461-480
-
-
Zheng, Y.1
Matsumoto, T.2
Imai, H.3
|