-
1
-
-
33745865955
-
High-speed pseudorandom number generation with small memory
-
Fast Software Encryption, of, Springer
-
W. Aiello, S. Rajagopalan, and R. Venkatesan. High-speed pseudorandom number generation with small memory. In Fast Software Encryption, volume 1636 of LNCS, pages 290-304. Springer, 1999.
-
(1999)
LNCS
, vol.1636
, pp. 290-304
-
-
Aiello, W.1
Rajagopalan, S.2
Venkatesan, R.3
-
2
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
ICICS '03, of, Springer
-
F. Bao, R. H. Deng, and H. Zhu. Variations of Diffie-Hellman problem. In ICICS '03, volume 2836 of LNCS, pages 301-312. Springer, 2003.
-
(2003)
LNCS
, vol.2836
, pp. 301-312
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
3
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proc. of the 38th Symposium on Foundations of Computer Science, pages 394-403. IEEE, 1997.
-
(1997)
Proc. of the 38th Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
84983089516
-
The security of cipher block chaining
-
Advances in Cryptology, CRYPTO '94, of, Springer
-
M. Bellare, J. Kilian, and P. Rogaway. The security of cipher block chaining. In Advances in Cryptology - CRYPTO '94, volume 839 of LNCS, pages 341-358. Springer, 1994.
-
(1994)
LNCS
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology, ASIACRYPT '00, of, Springer
-
M. Bellare and C Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - ASIACRYPT '00, volume 1976 of LNCS, pages 531-545. Springer, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
84957068240
-
Umac: Fast and secure message authentication
-
Advances in Cryptology, CRYPTO '99, of, Springer
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. Umac: Fast and secure message authentication. In Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 313-328. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 313-328
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
7
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Advances in Cryptology, CRYPTO '93, of, Springer
-
A. Blum, M. L. Furst, M. J. Kearns, and R. J. Lipton. Cryptographic primitives based on hard learning problems. In Advances in Cryptology - CRYPTO '93, volume 773 of LNCS, pages 278-291. Springer, 1993.
-
(1993)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.J.3
Lipton, R.J.4
-
8
-
-
33745828152
-
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security
-
Advances in Cryptology, CRYPTO '02, of, Springer
-
I. Damgård and J. B. Nielsen. Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. In Advances in Cryptology - CRYPTO '02, volume 2442 of LNCS, pages 449-464. Springer, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 449-464
-
-
Damgård, I.1
Nielsen, J.B.2
-
11
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
12
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
13
-
-
0033704913
-
Complete characterization of security notions for probabilistic private-key encryption
-
ACM
-
J. Katz and M. Yung. Complete characterization of security notions for probabilistic private-key encryption. In Proc. of the 32nd Annual Symposium on Theory of Computing, pages 245-254. ACM, 2000.
-
(2000)
Proc. of the 32nd Annual Symposium on Theory of Computing
, pp. 245-254
-
-
Katz, J.1
Yung, M.2
-
14
-
-
38049182503
-
Constructing weak pseudorandom functions with prescribed structure
-
Thesis, ETH Zurich
-
M. Keller. Constructing weak pseudorandom functions with prescribed structure, 2006. Semester Thesis, ETH Zurich.
-
(2006)
Semester
-
-
Keller, M.1
-
15
-
-
0003315821
-
IP encapsulating security payload (ESP)
-
November
-
S. Kent and R. Atkinson. IP encapsulating security payload (ESP), November 1998. Request for Comments 2406.
-
(1998)
Request for Comments
, pp. 2406
-
-
Kent, S.1
Atkinson, R.2
-
16
-
-
33745864772
-
Expanding weak PRF with small key size
-
ICISC '05, of, Springer
-
K. Minematsu and Y. Tsunoo. Expanding weak PRF with small key size. In ICISC '05, volume 3935 of LNCS, pages 284-298. Springer, 2005.
-
(2005)
LNCS
, vol.3935
, pp. 284-298
-
-
Minematsu, K.1
Tsunoo, Y.2
-
17
-
-
84957653598
-
Distributed pseudo-random functions and KDCs
-
Advances in Cryptology, EUROCRYPT '99, of, Springer
-
M. Naor, B. Pinkas, and O. Reingold. Distributed pseudo-random functions and KDCs. In Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pages 327-346. Springer, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 327-346
-
-
Naor, M.1
Pinkas, B.2
Reingold, O.3
-
18
-
-
84957617971
-
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
-
Advances in Cryptology, CRYPTO '98, Springer
-
M. Naor and O. Reingold. From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs. In Advances in Cryptology - CRYPTO '98, LNCS, pages 267-282. Springer, 1998.
-
(1998)
LNCS
, pp. 267-282
-
-
Naor, M.1
Reingold, O.2
-
19
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
M. Naor and O. Reingold, Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comp. Sys. Sci., 58(2):336-375, 1999.
-
(1999)
J. Comp. Sys. Sci
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
20
-
-
4243054954
-
Number-theoretic constructions of efficient pseudorandom functions
-
M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudorandom functions. J. of the ACM, 51(2):231-262, 2004.
-
(2004)
J. of the ACM
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
21
-
-
38049117154
-
Weak pseudorandom functions in minicrypt
-
November, Manuscript
-
K. Pietrzak and J. Sjödin. Weak pseudorandom functions in minicrypt, November 2006. Manuscript.
-
(2006)
-
-
Pietrzak, K.1
Sjödin, J.2
-
22
-
-
38049117155
-
-
K. Pietrzak and J. Sjödin. Domain extension for weak PRFs; the good, the bad, and the ugly. In Advances in Cryptology - EUROCRYPT '07, LNCS. Springer, 2007. This proceedings.
-
K. Pietrzak and J. Sjödin. Domain extension for weak PRFs; the good, the bad, and the ugly. In Advances in Cryptology - EUROCRYPT '07, LNCS. Springer, 2007. This proceedings.
-
-
-
-
23
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
Advances in Cryptology, CRYPTO '96, of, Springer
-
V. Shoup. On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology - CRYPTO '96, volume 1109 of LNCS, pages 313-328. Springer, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 313-328
-
-
Shoup, V.1
-
24
-
-
71049183202
-
Universal hashing and authentication codes
-
Advances in Cryptology, CRYPTO '91, of, Springer
-
D. R. Stinson. Universal hashing and authentication codes. In Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 74-85. Springer, 1992.
-
(1992)
LNCS
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
25
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. J. Comp. Sys. Sci., 22:265-279, 1981.
-
(1981)
J. Comp. Sys. Sci
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|