메뉴 건너뛰기




Volumn 5350 LNCS, Issue , 2008, Pages 161-178

Basing PRFs on constant-query weak PRFs: Minimizing assumptions for efficient symmetric cryptography

Author keywords

[No Author keywords available]

Indexed keywords

FUNCTIONS; PROBABILITY DENSITY FUNCTION; SECURITY OF DATA;

EID: 58349086248     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89255-7_11     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 1
    • 33749544409 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 602-619
    • Bellare, M.1
  • 2
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom functions revisited: The cascade construction and its concrete security
    • Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. In: FOCS 1996, pp. 514-523 (1996)
    • (1996) FOCS 1996 , pp. 514-523
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 0031351741 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption
    • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS 1997, pp. 394-403 (1997)
    • (1997) FOCS 1997 , pp. 394-403
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 5
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362-399 (2000)
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 6
    • 30744457437 scopus 로고    scopus 로고
    • Hash function balance and its impact on birthday attacks
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 401-418. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 401-418
    • Bellare, M.1    Kohno, T.2
  • 7
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 8
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In:Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216-233. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 10
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damgård, I.B.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 416-427
    • Damgård, I.B.1
  • 11
    • 33745828152 scopus 로고    scopus 로고
    • Expanding pseudorandom functions; or: From knownplaintext security to chosen-plaintext security
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Damgård, I.B., Nielsen, J.B.: Expanding pseudorandom functions; or: From knownplaintext security to chosen-plaintext security. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 449-464. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 449-464
    • Damgård, I.B.1    Nielsen, J.B.2
  • 12
    • 43149124861 scopus 로고    scopus 로고
    • Fischlin, M.: Security of NMAC and HMAC based on non-malleability. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, 4964, pp. 138-154. Springer, Heidelberg (2008)
    • Fischlin, M.: Security of NMAC and HMAC based on non-malleability. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 138-154. Springer, Heidelberg (2008)
  • 15
    • 38149084149 scopus 로고    scopus 로고
    • A simple variant of the Merkle-Damgård scheme with a permutation
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Hirose, S., Park, J.H., Yun, A.: A simple variant of the Merkle-Damgård scheme with a permutation. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 113-129. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 113-129
    • Hirose, S.1    Park, J.H.2    Yun, A.3
  • 16
    • 0033704913 scopus 로고    scopus 로고
    • Complete characterization of security notions for probabilistic private-key encryption
    • Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: STOC 2000, pp. 245-254 (2000)
    • (2000) STOC 2000 , pp. 245-254
    • Katz, J.1    Yung, M.2
  • 17
    • 38049177352 scopus 로고    scopus 로고
    • A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Maurer, U., Sjödin, J.: A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 498-516. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 498-516
    • Maurer, U.1    Sjödin, J.2
  • 18
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 19
    • 0032647187 scopus 로고    scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. Journal of Computer and System Sciences 58(2), 336-375 (1999)
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.2 , pp. 336-375
    • Naor, M.1    Reingold, O.2
  • 20
    • 38049144160 scopus 로고    scopus 로고
    • Range extension for weak PRFs; the good, the bad, and the ugly
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Pietrzak, K., Sjödin, J.: Range extension for weak PRFs; the good, the bad, and the ugly. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 517-533. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 517-533
    • Pietrzak, K.1    Sjödin, J.2
  • 21
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Stinson, D.R.: Universal hashing and authentication codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 74-85. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 22
    • 38149142690 scopus 로고    scopus 로고
    • Boosting Merkle-Damg?ard hashing for message authentication
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Yasuda, K.: Boosting Merkle-Damg?ard hashing for message authentication. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 216-231. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 216-231
    • Yasuda, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.