-
1
-
-
37849008829
-
Provably-secure schemes for basic query support in outsourced databases
-
Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007 Springer, Heidelberg
-
Amanatidis, G., Boldyreva, A., O'Neill, A.: Provably-secure schemes for basic query support in outsourced databases. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 14-30. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 14-30
-
-
Amanatidis, G.1
Boldyreva, A.2
O'Neill, A.3
-
2
-
-
77954095439
-
A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
-
INSTICC Press
-
Bard, G.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In: International Conference on Security and Cryptography, SECRYPT 2006, pp. 99-109. INSTICC Press (2006)
-
(2006)
International Conference on Security and Cryptography, SECRYPT 2006
, pp. 99-109
-
-
Bard, G.1
-
3
-
-
84880876495
-
On-line ciphers and the hash-CBC constructions
-
Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Knudsen, L., Namprempre, C.: On-line ciphers and the hash-CBC constructions. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 292-309. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 292-309
-
-
Bellare, M.1
Boldyreva, A.2
Knudsen, L.3
Namprempre, C.4
-
4
-
-
79951802570
-
On-line ciphers and the hash-CBC constructions
-
June 29 Full version of [3]
-
Bellare, M., Boldyreva, A., Knudsen, L., Namprempre, C.: On-line ciphers and the hash-CBC constructions. Cryptology ePrint report 2007/197, June 29 (2007) Full version of [3]
-
(2007)
Cryptology EPrint Report 2007/197
-
-
Bellare, M.1
Boldyreva, A.2
Knudsen, L.3
Namprempre, C.4
-
5
-
-
70549111101
-
Format preserving encryption
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009 Springer, Heidelberg
-
Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format preserving encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 295-312. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 295-312
-
-
Bellare, M.1
Ristenpart, T.2
Rogaway, P.3
Stegers, T.4
-
6
-
-
33746041431
-
Code-based game-playing proofs and the security of triple encryption
-
Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409- 426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
58549099735
-
New AES software speed records
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008 Springer, Heidelberg
-
Bernstein, D., Schwabe, P.: New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 322-336. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 322-336
-
-
Bernstein, D.1
Schwabe, P.2
-
9
-
-
35048835232
-
Online encryption schemes: New security notions and constructions
-
Okamoto, T. (ed.) CT-RSA 2004 Springer, Heidelberg
-
Boldyreva, A., Taesombut, N.: Online encryption schemes: new security notions and constructions. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 1-14. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 1-14
-
-
Boldyreva, A.1
Taesombut, N.2
-
10
-
-
35048826668
-
Authenticated on-line encryption
-
Matsui, M., Zuccherato, R.J. (eds.) SAC 2003 Springer, Heidelberg
-
Fouque, P., Joux, A., Martinet, G., Valette, F.: Authenticated on-line encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145-159. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3006
, pp. 145-159
-
-
Fouque, P.1
Joux, A.2
Martinet, G.3
Valette, F.4
-
11
-
-
24144492130
-
Blockwise adversarial model for on-line ciphers and symmetric encryption schemes
-
Fouque, P., Joux, A., Poupard, G.: Blockwise adversarial model for on-line ciphers and symmetric encryption schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 212-226. Springer, Heidelberg (2004) (Pubitemid 39743824)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3357
, pp. 212-226
-
-
Fouque, P.-A.1
Joux, A.2
Poupard, G.3
-
12
-
-
0242404221
-
Practical symmetricon-line encryption
-
Johansson, T. (ed.) FSE 2003 Springer, Heidelberg
-
Fouque, P., Martinet, G., Poupard, G.: Practical symmetricon-line encryption. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 362-375. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 362-375
-
-
Fouque, P.1
Martinet, G.2
Poupard, G.3
-
13
-
-
78651112791
-
Intel carry-less multiplication instruction and its usage for computing the GCM mode (revision 2)
-
May
-
Gueron, S., Kounavis, M.: Intel carry-less multiplication instruction and its usage for computing the GCM mode (revision 2). White paper (May 2010), http://www.intel.com
-
(2010)
White Paper
-
-
Gueron, S.1
Kounavis, M.2
-
14
-
-
33646717921
-
EME: Extending EME to handle arbitrary-length messages with associated data
-
Halevi, S.: EME: Extending EME to handle arbitrary-length messages with associated data. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 315-327. Springer, Heidelberg (2004) (Pubitemid 39748317)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 315-327
-
-
Halevi, S.1
-
15
-
-
38149093714
-
Blockwise-adaptive attackers: Revisiting the (in) security of some provably secureen cryption models: CBC, GEM, IACBC
-
Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
-
Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attackers: revisiting the (in)securityofsomeprovablysecureencryptionmodels:CBC,GEM,IACBC. In:Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17-30. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 17-30
-
-
Joux, A.1
Martinet, G.2
Valette, F.3
-
16
-
-
84991939136
-
LFSR-based hashing and authentication
-
Desmedt, Y.G. (ed.) CRYPTO 1994 Springer, Heidelberg
-
Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
17
-
-
84937407660
-
Tweakable block ciphers
-
Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
-
Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31-46. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
18
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
SIAM
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing 17(2), 373-386 (1988)
-
(1988)
Journal of Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
19
-
-
33845303377
-
The security and performance of the galois/counter mode (GCM) of operation
-
McGrew, D., Viega, J.: The security and performance of the Galois/counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343-355. Springer, Heidelberg (2004) (Pubitemid 39748319)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 343-355
-
-
McGrew, D.A.1
Viega, J.2
-
21
-
-
79951781779
-
A simple security analysis of Hash-CBC and a new efficient one-key online cipher
-
May 7
-
Nandi, M.: A simple security analysis of Hash-CBC and a new efficient one-key online cipher,Cryptology ePrint report 2007/158, May 7 (2007)
-
(2007)
Cryptology EPrint Report 2007/158
-
-
Nandi, M.1
-
22
-
-
58549112460
-
Two New Efficient CCA-secure online ciphers: MHCBC and MCBC
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008 Springer, Heidelberg Also Cryptology ePrint report 2008/401 (September 20, 2008
-
Nandi, M.: Two New Efficient CCA-secure online ciphers: MHCBC and MCBC. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 350-362. Springer, Heidelberg (2008); Also Cryptology ePrint report 2008/401 (September 20, 2008)
-
(2008)
LNCS
, vol.5365
, pp. 350-362
-
-
Nandi, M.1
-
23
-
-
0003064824
-
On the construction of pseudorandom permutations: Luby-Rackoff revisited
-
Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of Cryptology 12(1), 29-66 (1999)
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
24
-
-
35348931588
-
How to enrich the message space of a cipher
-
Biryukov, A. (ed.) FSE 2007 Springer, Heidelberg
-
Ristenpart, T., Rogaway, P.: How to enrich the message space of a cipher. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 101-118. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 101-118
-
-
Ristenpart, T.1
Rogaway, P.2
|