메뉴 건너뛰기




Volumn 6558 LNCS, Issue , 2011, Pages 237-249

Online ciphers from tweakable blockciphers

Author keywords

modes of operation; Online ciphers; provable security; symmetric encryption; tweakable blockciphers

Indexed keywords

MODES OF OPERATION; ONLINE CIPHERS; PROVABLE SECURITY; SYMMETRIC ENCRYPTION; TWEAKABLE BLOCKCIPHERS;

EID: 79951784877     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19074-2_16     Document Type: Conference Paper
Times cited : (34)

References (24)
  • 1
    • 37849008829 scopus 로고    scopus 로고
    • Provably-secure schemes for basic query support in outsourced databases
    • Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007 Springer, Heidelberg
    • Amanatidis, G., Boldyreva, A., O'Neill, A.: Provably-secure schemes for basic query support in outsourced databases. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 14-30. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4602 , pp. 14-30
    • Amanatidis, G.1    Boldyreva, A.2    O'Neill, A.3
  • 2
    • 77954095439 scopus 로고    scopus 로고
    • A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
    • INSTICC Press
    • Bard, G.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In: International Conference on Security and Cryptography, SECRYPT 2006, pp. 99-109. INSTICC Press (2006)
    • (2006) International Conference on Security and Cryptography, SECRYPT 2006 , pp. 99-109
    • Bard, G.1
  • 3
    • 84880876495 scopus 로고    scopus 로고
    • On-line ciphers and the hash-CBC constructions
    • Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Knudsen, L., Namprempre, C.: On-line ciphers and the hash-CBC constructions. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 292-309. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 292-309
    • Bellare, M.1    Boldyreva, A.2    Knudsen, L.3    Namprempre, C.4
  • 5
    • 70549111101 scopus 로고    scopus 로고
    • Format preserving encryption
    • Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009 Springer, Heidelberg
    • Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format preserving encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 295-312. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5867 , pp. 295-312
    • Bellare, M.1    Ristenpart, T.2    Rogaway, P.3    Stegers, T.4
  • 6
    • 33746041431 scopus 로고    scopus 로고
    • Code-based game-playing proofs and the security of triple encryption
    • Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409- 426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 58549099735 scopus 로고    scopus 로고
    • New AES software speed records
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008 Springer, Heidelberg
    • Bernstein, D., Schwabe, P.: New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 322-336. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 322-336
    • Bernstein, D.1    Schwabe, P.2
  • 9
    • 35048835232 scopus 로고    scopus 로고
    • Online encryption schemes: New security notions and constructions
    • Okamoto, T. (ed.) CT-RSA 2004 Springer, Heidelberg
    • Boldyreva, A., Taesombut, N.: Online encryption schemes: new security notions and constructions. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 1-14. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 1-14
    • Boldyreva, A.1    Taesombut, N.2
  • 10
    • 35048826668 scopus 로고    scopus 로고
    • Authenticated on-line encryption
    • Matsui, M., Zuccherato, R.J. (eds.) SAC 2003 Springer, Heidelberg
    • Fouque, P., Joux, A., Martinet, G., Valette, F.: Authenticated on-line encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145-159. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3006 , pp. 145-159
    • Fouque, P.1    Joux, A.2    Martinet, G.3    Valette, F.4
  • 12
    • 0242404221 scopus 로고    scopus 로고
    • Practical symmetricon-line encryption
    • Johansson, T. (ed.) FSE 2003 Springer, Heidelberg
    • Fouque, P., Martinet, G., Poupard, G.: Practical symmetricon-line encryption. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 362-375. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2887 , pp. 362-375
    • Fouque, P.1    Martinet, G.2    Poupard, G.3
  • 13
    • 78651112791 scopus 로고    scopus 로고
    • Intel carry-less multiplication instruction and its usage for computing the GCM mode (revision 2)
    • May
    • Gueron, S., Kounavis, M.: Intel carry-less multiplication instruction and its usage for computing the GCM mode (revision 2). White paper (May 2010), http://www.intel.com
    • (2010) White Paper
    • Gueron, S.1    Kounavis, M.2
  • 15
    • 38149093714 scopus 로고    scopus 로고
    • Blockwise-adaptive attackers: Revisiting the (in) security of some provably secureen cryption models: CBC, GEM, IACBC
    • Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
    • Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attackers: revisiting the (in)securityofsomeprovablysecureencryptionmodels:CBC,GEM,IACBC. In:Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17-30. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 17-30
    • Joux, A.1    Martinet, G.2    Valette, F.3
  • 16
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Desmedt, Y.G. (ed.) CRYPTO 1994 Springer, Heidelberg
    • Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 17
    • 84937407660 scopus 로고    scopus 로고
    • Tweakable block ciphers
    • Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
    • Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31-46. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 31-46
    • Liskov, M.1    Rivest, R.2    Wagner, D.3
  • 18
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • SIAM
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing 17(2), 373-386 (1988)
    • (1988) Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 21
    • 79951781779 scopus 로고    scopus 로고
    • A simple security analysis of Hash-CBC and a new efficient one-key online cipher
    • May 7
    • Nandi, M.: A simple security analysis of Hash-CBC and a new efficient one-key online cipher,Cryptology ePrint report 2007/158, May 7 (2007)
    • (2007) Cryptology EPrint Report 2007/158
    • Nandi, M.1
  • 22
    • 58549112460 scopus 로고    scopus 로고
    • Two New Efficient CCA-secure online ciphers: MHCBC and MCBC
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008 Springer, Heidelberg Also Cryptology ePrint report 2008/401 (September 20, 2008
    • Nandi, M.: Two New Efficient CCA-secure online ciphers: MHCBC and MCBC. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 350-362. Springer, Heidelberg (2008); Also Cryptology ePrint report 2008/401 (September 20, 2008)
    • (2008) LNCS , vol.5365 , pp. 350-362
    • Nandi, M.1
  • 23
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudorandom permutations: Luby-Rackoff revisited
    • Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of Cryptology 12(1), 29-66 (1999)
    • (1999) Journal of Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 24
    • 35348931588 scopus 로고    scopus 로고
    • How to enrich the message space of a cipher
    • Biryukov, A. (ed.) FSE 2007 Springer, Heidelberg
    • Ristenpart, T., Rogaway, P.: How to enrich the message space of a cipher. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 101-118. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4593 , pp. 101-118
    • Ristenpart, T.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.