메뉴 건너뛰기




Volumn 4593 LNCS, Issue , 2007, Pages 101-118

How to enrich the message space of a cipher

Author keywords

Deterministic encryption; Enciphering scheme; Length preserving encryption; Multipermutation; Symmetric encryption

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 35348931588     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74619-5_7     Document Type: Conference Paper
Times cited : (27)

References (31)
  • 1
    • 84957098482 scopus 로고    scopus 로고
    • Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • An, J., Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 252-269. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 252-269
    • An, J.1    Bellare, M.2
  • 2
    • 84958975323 scopus 로고    scopus 로고
    • Two practical and provably secure block ciphers: BEAR and LION
    • Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
    • Anderson, R., Biham, E.: Two practical and provably secure block ciphers: BEAR and LION. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 113-120. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1039 , pp. 113-120
    • Anderson, R.1    Biham, E.2
  • 3
    • 84957665479 scopus 로고    scopus 로고
    • Bellare, M., Rogaway, P.: On the construction of variable-input-length ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 231-244. Springer, Heidelberg (1999)
    • Bellare, M., Rogaway, P.: On the construction of variable-input-length ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 231-244. Springer, Heidelberg (1999)
  • 4
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
    • Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 317-330. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84944886613 scopus 로고    scopus 로고
    • Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, 2271, pp. 114-130. Springer, Heidelberg (2002)
    • Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 114-130. Springer, Heidelberg (2002)
  • 7
    • 17444395938 scopus 로고
    • On Latin squares. Oxford Cambridge Dublin
    • Cayley, A.: On Latin squares. Oxford Cambridge Dublin Messenger Math. 19, 135-137 (1890)
    • (1890) Messenger Math , vol.19 , pp. 135-137
    • Cayley, A.1
  • 8
    • 33746720875 scopus 로고    scopus 로고
    • Chakraborty, D., Sarkar, P.: A new mode of encryption providing a strong tweakable pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 293-309. Springer, Heidelberg (2006)
    • Chakraborty, D., Sarkar, P.: A new mode of encryption providing a strong tweakable pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 293-309. Springer, Heidelberg (2006)
  • 9
    • 69849114716 scopus 로고    scopus 로고
    • HCH: A new tweakable enciphering scheme using the Hash-Encrypt-Hash approach
    • Barua, R, Lange, T, eds, INDOCRYPT 2006, Springer, Heidelberg
    • Chakraborty, D., Sarkar, P.: HCH: A new tweakable enciphering scheme using the Hash-Encrypt-Hash approach. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 287-302. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4329 , pp. 287-302
    • Chakraborty, D.1    Sarkar, P.2
  • 12
    • 33646717921 scopus 로고    scopus 로고
    • EME*: Extending EME to handle arbitrary-length messages with associated data
    • Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
    • Halevi, S.: EME*: Extending EME to handle arbitrary-length messages with associated data. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 315-327. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3348 , pp. 315-327
    • Halevi, S.1
  • 14
    • 35048894821 scopus 로고    scopus 로고
    • Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 292-304. Springer, Heidelberg (2004)
    • Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 292-304. Springer, Heidelberg (2004)
  • 15
    • 35248863065 scopus 로고    scopus 로고
    • A tweakable enciphering mode
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482-499. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 16
    • 84937407660 scopus 로고    scopus 로고
    • Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, 2442, pp. 31-46. Springer, Heidelberg (2002)
    • Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31-46. Springer, Heidelberg (2002)
  • 17
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing 17(2), 373-386 (1988)
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 18
    • 38349063731 scopus 로고    scopus 로고
    • Lucks, S.: BEAST: A fast block cipher for arbitrary blocksizes. In: Communications and Multimedia Security, IFIP, 70, pp. 144-153. Chapman & Hill, Sydney, Australia (1996)
    • Lucks, S.: BEAST: A fast block cipher for arbitrary blocksizes. In: Communications and Multimedia Security, IFIP, vol. 70, pp. 144-153. Chapman & Hill, Sydney, Australia (1996)
  • 19
    • 51849100070 scopus 로고    scopus 로고
    • Lucks, S.: Faster Luby-Rackoff ciphers. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, 1039, pp. 189-203. Springer, Heidelberg (1996)
    • Lucks, S.: Faster Luby-Rackoff ciphers. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 189-203. Springer, Heidelberg (1996)
  • 22
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudorandom permutations: Luby-Rackoff revisited
    • Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of Cryptology 12(1), 29-66 (1999)
    • (1999) Journal of Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 23
    • 85034496745 scopus 로고
    • How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Patarin, J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 256-266. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 256-266
    • Patarin, J.1
  • 24
    • 33745569797 scopus 로고    scopus 로고
    • Patel, S., Ramzan, Z., Sundaram, G.: Efficient constructions of variable-input-length block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, pp. 326-340. Springer, Heidelberg (2004)
    • Patel, S., Ramzan, Z., Sundaram, G.: Efficient constructions of variable-input-length block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 326-340. Springer, Heidelberg (2004)
  • 25
    • 38349079254 scopus 로고    scopus 로고
    • Ristenpart, T., Rogaway, P.: How to enrich the Message Space of a Cipher (full version of this paper), http://www.cse.ucsd.edu/users/tristenp/
    • Ristenpart, T., Rogaway, P.: How to enrich the Message Space of a Cipher (full version of this paper), http://www.cse.ucsd.edu/users/tristenp/
  • 26
    • 84958955327 scopus 로고    scopus 로고
    • Unbalanced Feistel networks and block cipher design
    • Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
    • Schneier, B., Kelsey, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 121-144. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1039 , pp. 121-144
    • Schneier, B.1    Kelsey, J.2
  • 27
    • 0012099837 scopus 로고
    • Black box cryptanalysis of hash networks based on multipermutations
    • De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
    • Schnorr, C., Vaudenay, S.: Black box cryptanalysis of hash networks based on multipermutations. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 47-57. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.950 , pp. 47-57
    • Schnorr, C.1    Vaudenay, S.2
  • 29
    • 84948973102 scopus 로고
    • On the need for multipermutations: Cryptanalysis of MD4 and SAFER
    • Preneel, B, ed, Fast Software Encryption, Springer, Heidelberg
    • Vaudenay, S.: On the need for multipermutations: cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) Fast Software Encryption. LNCS, vol. 1008, pp. 286-297. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.1008 , pp. 286-297
    • Vaudenay, S.1
  • 30
    • 33744898820 scopus 로고    scopus 로고
    • Wang, P., Feng, D., Wu, W.: HCTR: a variable-input-length enciphering mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, 3822, pp. 175-188. Springer, Heidelberg (2005)
    • Wang, P., Feng, D., Wu, W.: HCTR: a variable-input-length enciphering mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 175-188. Springer, Heidelberg (2005)
  • 31
    • 85032866581 scopus 로고
    • On the construction of block ciphers provably secure and not relying on any unproved hypotheses
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 461-480. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 461-480
    • Zheng, Y.1    Matsumoto, T.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.