메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 498-516

A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CODES (SYMBOLS); COMPUTATIONAL EFFICIENCY; INTRUSION DETECTION; RANDOM PROCESSES;

EID: 38049177352     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_29     Document Type: Conference Paper
Times cited : (15)

References (25)
  • 1
    • 33745865955 scopus 로고    scopus 로고
    • High-speed pseudorandom number generation with small memory
    • Fast Software Encryption, of, Springer
    • W. Aiello, S. Rajagopalan, and R. Venkatesan. High-speed pseudorandom number generation with small memory. In Fast Software Encryption, volume 1636 of LNCS, pages 290-304. Springer, 1999.
    • (1999) LNCS , vol.1636 , pp. 290-304
    • Aiello, W.1    Rajagopalan, S.2    Venkatesan, R.3
  • 2
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman problem
    • ICICS '03, of, Springer
    • F. Bao, R. H. Deng, and H. Zhu. Variations of Diffie-Hellman problem. In ICICS '03, volume 2836 of LNCS, pages 301-312. Springer, 2003.
    • (2003) LNCS , vol.2836 , pp. 301-312
    • Bao, F.1    Deng, R.H.2    Zhu, H.3
  • 4
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • Advances in Cryptology, CRYPTO '94, of, Springer
    • M. Bellare, J. Kilian, and P. Rogaway. The security of cipher block chaining. In Advances in Cryptology - CRYPTO '94, volume 839 of LNCS, pages 341-358. Springer, 1994.
    • (1994) LNCS , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 5
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Advances in Cryptology, ASIACRYPT '00, of, Springer
    • M. Bellare and C Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - ASIACRYPT '00, volume 1976 of LNCS, pages 531-545. Springer, 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 6
    • 84957068240 scopus 로고    scopus 로고
    • Umac: Fast and secure message authentication
    • Advances in Cryptology, CRYPTO '99, of, Springer
    • J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. Umac: Fast and secure message authentication. In Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 313-328. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 313-328
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 7
    • 84877639283 scopus 로고
    • Cryptographic primitives based on hard learning problems
    • Advances in Cryptology, CRYPTO '93, of, Springer
    • A. Blum, M. L. Furst, M. J. Kearns, and R. J. Lipton. Cryptographic primitives based on hard learning problems. In Advances in Cryptology - CRYPTO '93, volume 773 of LNCS, pages 278-291. Springer, 1993.
    • (1993) LNCS , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.L.2    Kearns, M.J.3    Lipton, R.J.4
  • 8
    • 33745828152 scopus 로고    scopus 로고
    • Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security
    • Advances in Cryptology, CRYPTO '02, of, Springer
    • I. Damgård and J. B. Nielsen. Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. In Advances in Cryptology - CRYPTO '02, volume 2442 of LNCS, pages 449-464. Springer, 2002.
    • (2002) LNCS , vol.2442 , pp. 449-464
    • Damgård, I.1    Nielsen, J.B.2
  • 11
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 12
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
    • (1999) SIAM J. Comput , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 13
    • 0033704913 scopus 로고    scopus 로고
    • Complete characterization of security notions for probabilistic private-key encryption
    • ACM
    • J. Katz and M. Yung. Complete characterization of security notions for probabilistic private-key encryption. In Proc. of the 32nd Annual Symposium on Theory of Computing, pages 245-254. ACM, 2000.
    • (2000) Proc. of the 32nd Annual Symposium on Theory of Computing , pp. 245-254
    • Katz, J.1    Yung, M.2
  • 14
    • 38049182503 scopus 로고    scopus 로고
    • Constructing weak pseudorandom functions with prescribed structure
    • Thesis, ETH Zurich
    • M. Keller. Constructing weak pseudorandom functions with prescribed structure, 2006. Semester Thesis, ETH Zurich.
    • (2006) Semester
    • Keller, M.1
  • 15
    • 0003315821 scopus 로고    scopus 로고
    • IP encapsulating security payload (ESP)
    • November
    • S. Kent and R. Atkinson. IP encapsulating security payload (ESP), November 1998. Request for Comments 2406.
    • (1998) Request for Comments , pp. 2406
    • Kent, S.1    Atkinson, R.2
  • 16
    • 33745864772 scopus 로고    scopus 로고
    • Expanding weak PRF with small key size
    • ICISC '05, of, Springer
    • K. Minematsu and Y. Tsunoo. Expanding weak PRF with small key size. In ICISC '05, volume 3935 of LNCS, pages 284-298. Springer, 2005.
    • (2005) LNCS , vol.3935 , pp. 284-298
    • Minematsu, K.1    Tsunoo, Y.2
  • 17
    • 84957653598 scopus 로고    scopus 로고
    • Distributed pseudo-random functions and KDCs
    • Advances in Cryptology, EUROCRYPT '99, of, Springer
    • M. Naor, B. Pinkas, and O. Reingold. Distributed pseudo-random functions and KDCs. In Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pages 327-346. Springer, 1999.
    • (1999) LNCS , vol.1592 , pp. 327-346
    • Naor, M.1    Pinkas, B.2    Reingold, O.3
  • 18
    • 84957617971 scopus 로고    scopus 로고
    • From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
    • Advances in Cryptology, CRYPTO '98, Springer
    • M. Naor and O. Reingold. From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs. In Advances in Cryptology - CRYPTO '98, LNCS, pages 267-282. Springer, 1998.
    • (1998) LNCS , pp. 267-282
    • Naor, M.1    Reingold, O.2
  • 19
    • 0032647187 scopus 로고    scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • M. Naor and O. Reingold, Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comp. Sys. Sci., 58(2):336-375, 1999.
    • (1999) J. Comp. Sys. Sci , vol.58 , Issue.2 , pp. 336-375
    • Naor, M.1    Reingold, O.2
  • 20
    • 4243054954 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudorandom functions
    • M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudorandom functions. J. of the ACM, 51(2):231-262, 2004.
    • (2004) J. of the ACM , vol.51 , Issue.2 , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 21
    • 38049117154 scopus 로고    scopus 로고
    • Weak pseudorandom functions in minicrypt
    • November, Manuscript
    • K. Pietrzak and J. Sjödin. Weak pseudorandom functions in minicrypt, November 2006. Manuscript.
    • (2006)
    • Pietrzak, K.1    Sjödin, J.2
  • 22
    • 38049117155 scopus 로고    scopus 로고
    • K. Pietrzak and J. Sjödin. Domain extension for weak PRFs; the good, the bad, and the ugly. In Advances in Cryptology - EUROCRYPT '07, LNCS. Springer, 2007. This proceedings.
    • K. Pietrzak and J. Sjödin. Domain extension for weak PRFs; the good, the bad, and the ugly. In Advances in Cryptology - EUROCRYPT '07, LNCS. Springer, 2007. This proceedings.
  • 23
    • 84942520895 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • Advances in Cryptology, CRYPTO '96, of, Springer
    • V. Shoup. On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology - CRYPTO '96, volume 1109 of LNCS, pages 313-328. Springer, 1996.
    • (1996) LNCS , vol.1109 , pp. 313-328
    • Shoup, V.1
  • 24
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Advances in Cryptology, CRYPTO '91, of, Springer
    • D. R. Stinson. Universal hashing and authentication codes. In Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 74-85. Springer, 1992.
    • (1992) LNCS , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 25
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. J. Comp. Sys. Sci., 22:265-279, 1981.
    • (1981) J. Comp. Sys. Sci , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.