메뉴 건너뛰기




Volumn 5444 LNCS, Issue , 2009, Pages 128-145

Security amplification for interactive cryptographic primitives

Author keywords

[No Author keywords available]

Indexed keywords

COLLISION-RESISTANT HASH FUNCTIONS; CRYPTOGRAPHIC PRIMITIVES; DIGITAL SIGNATURE; DIRECT PRODUCT; ENCRYPTION SCHEMES; MESSAGE AUTHENTICATION CODES; NON-INTERACTIVE; ONE-WAY FUNCTIONS; OPTIMAL SECURITY; PSEUDO-RANDOM FUNCTIONS; SECURITY AMPLIFICATION; VERIFIABLE PUZZLES; XOR LEMMA;

EID: 70350281850     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00457-5_9     Document Type: Conference Paper
Times cited : (21)

References (21)
  • 2
    • 24144435673 scopus 로고    scopus 로고
    • Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 17-33. Springer, Heidelberg (2005)
    • Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005)
  • 3
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Coron, J.S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 229-235
    • Coron, J.S.1
  • 4
    • 38049123011 scopus 로고    scopus 로고
    • Amplifying collision resistance: A complexity-theoretic treatment
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Canetti, R., Rivest, R., Sudan, M., Trevisan, L., Vadhan, S., Wee, H.: Amplifying collision resistance: A complexity-theoretic treatment. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 264-283. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 264-283
    • Canetti, R.1    Rivest, R.2    Sudan, M.3    Trevisan, L.4    Vadhan, S.5    Wee, H.6
  • 5
    • 35048881610 scopus 로고    scopus 로고
    • Immunizing encryption schemes from decryption errors
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Dwork, C., Naor, M., Reingold, O.: Immunizing encryption schemes from decryption errors. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 342-360. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 342-360
    • Dwork, C.1    Naor, M.2    Reingold, O.3
  • 13
    • 51249173191 scopus 로고
    • One-way functions and pseudorandom generators
    • Levin, L.A.: One-way functions and pseudorandom generators. Combinatorica 7(4), 357-363 (1987)
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 357-363
    • Levin, L.A.1
  • 15
    • 23944518373 scopus 로고    scopus 로고
    • Efficient Amplification of the Security of Weak Pseudo-Random Function Generators
    • Myers, S.: Efficient Amplification of the Security of Weak Pseudo-Random Function Generators. J. Cryptology 16(1), 1-24 (2003)
    • (2003) J. Cryptology , vol.16 , Issue.1 , pp. 1-24
    • Myers, S.1
  • 16
    • 71049120890 scopus 로고    scopus 로고
    • Myers, S.: On the development of block-ciphers and pseudorandom function generators using the composition and XOR operators. Master's thesis, University of Toronto (1999)
    • Myers, S.: On the development of block-ciphers and pseudorandom function generators using the composition and XOR operators. Master's thesis, University of Toronto (1999)
  • 17
    • 84957617971 scopus 로고    scopus 로고
    • From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Naor, M., Reingold, O.: From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 267-282. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 267-282
    • Naor, M.1    Reingold, O.2
  • 18
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudorandom permutations: Luby-Rackoff revisited
    • Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of Cryptology, 29-66 (1999)
    • (1999) Journal of Cryptology , vol.29-66
    • Naor, M.1    Reingold, O.2
  • 20
    • 38049052188 scopus 로고    scopus 로고
    • Pietrzak, K.,Wikstrom, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 86-102. Springer, Heidelberg (2007)
    • Pietrzak, K.,Wikstrom, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 86-102. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.