메뉴 건너뛰기




Volumn 4284 LNCS, Issue , 2006, Pages 210-225

On the security of OAEP

Author keywords

[No Author keywords available]

Indexed keywords

CHOSEN-PLAINTEXT ATTACK; CRYPTOGRAPHIC PRIMITIVES; ENCRYPTION SCHEMES; NON-MALLEABILITY; NON-TRIVIAL; PROVABLY SECURE; RANDOM ORACLE; RANDOM ORACLE MODEL; SSL/TLS; SUFFICIENT CONDITIONS; THE STANDARD MODEL;

EID: 55749085358     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935230_14     Document Type: Conference Paper
Times cited : (31)

References (22)
  • 1
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Eurocrypt 2004, of, Springer-Verlag
    • M. Bellare, A. Boldyreva and A. Palacio. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In Eurocrypt 2004, Volume 3027 of LNCS, pp. 171-188. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 2
    • 77649248690 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2006/223
    • D. R. L. Brown. Unprovable Security of RSA-OAEP in the Standard Model. Cryptology ePrint Archive, Report 2006/223, 2006.
    • (2006)
    • Brown, D.R.L.1
  • 3
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • CRYPTO '98, of, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In CRYPTO '98, Volume 1462 of LNCS, pp. 26-45. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM
    • M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In CCS '93, pp. 62-73. ACM, 1993.
    • (1993) CCS '93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption - how to encrypt with RSA
    • Springer-Verlag
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with RSA. In Eurocrypt '94, Volume 950 of of LNCS, pp. 92-111. Springer-Verlag, 1995.
    • (1995) Eurocrypt '94, Volume 950 of of LNCS , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 35048892549 scopus 로고    scopus 로고
    • Near-Collisions of SHA-0
    • CRYPTO' 2004, of, Springer-Verlag
    • E. Biham and R. Chen. Near-Collisions of SHA-0. In CRYPTO' 2004, Volume 3152 of LNCS, pp. 290-305. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1, Springer-Verlag
    • D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. In CRYPTO '98, Volume 1462 of LNCS, pp. 1-12. Springer-Verlag, 1998.
    • (1998) CRYPTO '98, Volume 1462 of LNCS , pp. 1-12
    • Bleichenbacher, D.1
  • 8
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • SIAM
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. Journal on Computing, Volume 13, pp. 850-864, SIAM, 1984.
    • (1984) Journal on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 9
    • 33745157897 scopus 로고    scopus 로고
    • Analysis of random-oracle instantiation scenarios for OAEP and other practical schemes
    • CRYPTO 2005, of, Springer-Verlag
    • A. Boldyreva and M. Fischlin. Analysis of random-oracle instantiation scenarios for OAEP and other practical schemes. In CRYPTO 2005, Volume 3621 of LNCS, pp. 412-429. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 412-429
    • Boldyreva, A.1    Fischlin, M.2
  • 11
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • CRYPTO '97, of, Springer-Verlag
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In CRYPTO '97, Volume 1294 of LNCS. pp. 455-469. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 12
    • 0031619016 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • ACM
    • R. Canetti, O. Goldreich and S. Halevi. The random oracle methodology, revisited. In STOC '98, pp. 209-218. ACM, 1998.
    • (1998) STOC '98 , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 13
    • 0031624874 scopus 로고    scopus 로고
    • Perfectly one-way probabilistic hash functions
    • ACM
    • R. Canetti, D. Micciancio and O. Reingold. Perfectly one-way probabilistic hash functions. In STOC '98, pp. 131-140. ACM, 1998.
    • (1998) STOC '98 , pp. 131-140
    • Canetti, R.1    Micciancio, D.2    Reingold, O.3
  • 14
    • 33745155794 scopus 로고    scopus 로고
    • On the generic insecurity of full-domain hash
    • CRYPTO 2005, of, Springer-Verlag
    • Y. Dodis, R. Oliveira, and K. Pietrzak. On the generic insecurity of full-domain hash. In CRYPTO 2005, Volume 3621 of LNCS, pp. 449-466. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 449-466
    • Dodis, Y.1    Oliveira, R.2    Pietrzak, K.3
  • 15
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • SIAM
    • D. Dolev, C. Dwork and M. Naor. Non-malleable cryptography. Journal on Computing, Vol. 30(2), pp. 391-437. SIAM, 2000.
    • (2000) Journal on Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 16
    • 84880853825 scopus 로고    scopus 로고
    • RSA-OAEP is secure under the RSA assumption
    • CRYPTO 2001, of, Springer-Verlag
    • E. Fujisaki, T. Okamoto, D. Pointcheval and J. Stern. RSA-OAEP is secure under the RSA assumption. In CRYPTO 2001, volume 2139 of LNCS, pp. 260-274. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 260-274
    • Fujisaki, E.1    Okamoto, T.2    Pointcheval, D.3    Stern, J.4
  • 17
    • 32844456747 scopus 로고    scopus 로고
    • On the (in)security of the Fiat-Shamir paradigm
    • IEEE
    • S. Goldwasser and Y. T. Kalai. On the (in)security of the Fiat-Shamir paradigm. In FOCS 2003. IEEE, 2003.
    • (2003) FOCS 2003
    • Goldwasser, S.1    Kalai, Y.T.2
  • 18
    • 77649240115 scopus 로고    scopus 로고
    • November 2005
    • IETF-TLS Working Group. Transport Layer Security. http://www.ietf.org/ html.charters/tls-charter.html, November 2005.
    • Group. Transport Layer Security
  • 19
    • 35048817517 scopus 로고    scopus 로고
    • Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
    • TCC 2004, of, Springer-Verlag
    • U. Maurer, R. Renner and C. Holenstein. Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In TCC 2004, volume 2951 of LNCS, pp. 21-39. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2951 , pp. 21-39
    • Maurer, U.1    Renner, R.2    Holenstein, C.3
  • 20
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • CRYPTO 2002, of, Springer-Verlag
    • J. Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In CRYPTO 2002, volume 2442 of LNCS, pp. 111-126. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.1
  • 21
    • 33646784002 scopus 로고    scopus 로고
    • Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
    • Asiacrypt 2005, of, Springer-Verlag
    • P. Paillier and D. Vergnaud. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. In Asiacrypt 2005, volume 3788 of LNCS, pp. 1-20. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3788 , pp. 1-20
    • Paillier, P.1    Vergnaud, D.2
  • 22
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • IEEE
    • A. Yao. Theory and applications of trapdoor functions. In FOCS '82, pp. 80-91. IEEE, 1982.
    • (1982) FOCS '82 , pp. 80-91
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.