-
1
-
-
77958052672
-
On the Indifferentiability of the Grøstl Hash Function
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Andreeva, E., Mennink, B., Preneel, B.: On the Indifferentiability of the Grøstl Hash Function. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 88-105. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 88-105
-
-
Andreeva, E.1
Mennink, B.2
Preneel, B.3
-
2
-
-
38149094108
-
Seven-Property-Preserving Iterated Hashing: ROX
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-Property- Preserving Iterated Hashing: ROX. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 130-146. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 130-146
-
-
Andreeva, E.1
Neven, G.2
Preneel, B.3
Shrimpton, T.4
-
3
-
-
33749544409
-
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Bellare, M.: New Proofs for NMAC and HMAC: Security Without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 602-619
-
-
Bellare, M.1
-
4
-
-
72449189555
-
Hedged Public-Key Encryption: How to Protect against Bad Randomness
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged Public-Key Encryption: How to Protect against Bad Randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 232-249
-
-
Bellare, M.1
Brakerski, Z.2
Naor, M.3
Ristenpart, T.4
Segev, G.5
Shacham, H.6
Yilek, S.7
-
5
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
35248860702
-
A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Bellare, M., Kohno, T.: A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 491-506
-
-
Bellare, M.1
Kohno, T.2
-
7
-
-
77649268663
-
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 299-314
-
-
Bellare, M.1
Ristenpart, T.2
-
8
-
-
38149004817
-
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
-
Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 399-410. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4596
, pp. 399-410
-
-
Bellare, M.1
Ristenpart, T.2
-
9
-
-
84865482068
-
Multi-Instance Security and Its Application to Password-Based Cryptography
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Bellare, M., Ristenpart, T., Tessaro, S.: Multi-Instance Security and Its Application to Password-Based Cryptography. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 312-329. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 312-329
-
-
Bellare, M.1
Ristenpart, T.2
Tessaro, S.3
-
10
-
-
33746041431
-
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
44449147491
-
On the Indifferentiability of the Sponge Construction
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
12
-
-
50249125892
-
Improved Indifferentiability Security Analysis of chopMD Hash Function
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Chang, D., Nandi, M.: Improved Indifferentiability Security Analysis of chopMD Hash Function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 429-443. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 429-443
-
-
Chang, D.1
Nandi, M.2
-
13
-
-
33745119040
-
Merkle-Damgård Revisited: How to Construct a Hash Function
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård Revisited: How to Construct a Hash Function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
14
-
-
35048839833
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494-510. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
15
-
-
70350779943
-
Indifferentiability of Permutation- Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Rivest, R.L., Shen, E.: Indifferentiability of Permutation- Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 104-121. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 104-121
-
-
Dodis, Y.1
Reyzin, L.2
Rivest, R.L.3
Shen, E.4
-
16
-
-
67650652323
-
Salvaging Merkle-Damgård for Practical Applications
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Dodis, Y., Ristenpart, T., Shrimpton, T.: Salvaging Merkle-Damgård for Practical Applications. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 371-388. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 371-388
-
-
Dodis, Y.1
Ristenpart, T.2
Shrimpton, T.3
-
17
-
-
84865445948
-
-
Full version of this paper. Available from authors' websites
-
Dodis, Y., Ristenpart, T., Steinberger, J., Tessaro, S.: To Hash or Not to Hash, Again? On the Indifferentiability of the Second Iterate and HMAC (2012); Full version of this paper. Available from authors' websites
-
(2012)
To Hash or Not to Hash, Again? On the Indifferentiability of the Second Iterate and HMAC
-
-
Dodis, Y.1
Ristenpart, T.2
Steinberger, J.3
Tessaro, S.4
-
18
-
-
84943235829
-
Pricing via Processing or Combatting Junk Mail
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
19
-
-
33745136796
-
Pebbling and Proofs of Work
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Dwork, C., Naor, M., Wee, H.: Pebbling and Proofs of Work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37-54. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 37-54
-
-
Dwork, C.1
Naor, M.2
Wee, H.3
-
21
-
-
77952388608
-
HMAC is a randomness extractor and applications to TLS
-
Abe, M., Gligor, V. (eds.) ACM Press March
-
Fouque, P.-A., Pointcheval, D., Zimmer, S.: HMAC is a randomness extractor and applications to TLS. In: Abe, M., Gligor, V. (eds.) ASIACCS 2008: 3rd Conference on Computer and Communications Security, pp. 21-32. ACM Press (March 2008)
-
(2008)
ASIACCS 2008: 3rd Conference on Computer and Communications Security
, pp. 21-32
-
-
Fouque, P.-A.1
Pointcheval, D.2
Zimmer, S.3
-
22
-
-
0003544256
-
-
RFC 2069 (Proposed Standard) January Obsoleted by RFC 2617
-
Franks, J., Hallam-Baker, P., Hostetler, J., Leach, P., Luotonen, A., Sink, E., Stewart, L.: An Extension to HTTP: Digest Access Authentication. RFC 2069 (Proposed Standard) (January 1997); Obsoleted by RFC 2617
-
(1997)
An Extension to HTTP: Digest Access Authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Leach, P.4
Luotonen, A.5
Sink, E.6
Stewart, L.7
-
23
-
-
38149084149
-
A Simple Variant of the Merkle-Damg?ard Scheme with a Permutation
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Hirose, S., Park, J.H., Yun, A.: A Simple Variant of the Merkle-Damg?ard Scheme with a Permutation. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 113-129. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 113-129
-
-
Hirose, S.1
Park, J.H.2
Yun, A.3
-
25
-
-
78049359365
-
Low-Cost Client Puzzles Based on Modular Exponentiation
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Karame, G.O., Čapkun, S.: Low-Cost Client Puzzles Based on Modular Exponentiation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 679-697. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 679-697
-
-
Karame, G.O.1
Čapkun, S.2
-
28
-
-
77957013995
-
Cryptographic Extraction and Key Derivation: The HKDF Scheme
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Krawczyk, H.: Cryptographic Extraction and Key Derivation: The HKDF Scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631-648. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 631-648
-
-
Krawczyk, H.1
-
29
-
-
35048817517
-
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 21-39
-
-
Maurer, U.1
Renner, R.2
Holenstein, C.3
-
31
-
-
79958012441
-
Careful with Composition: Limitations of the Indifferentiability Framework
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Ristenpart, T., Shacham, H., Shrimpton, T.: Careful with Composition: Limitations of the Indifferentiability Framework. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 487-506. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 487-506
-
-
Ristenpart, T.1
Shacham, H.2
Shrimpton, T.3
-
32
-
-
85175129914
-
When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography
-
ISOC
-
Ristenpart, T., Yilek, S.: When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. In: Network and Distributed Systems Security- NDSS 2010. ISOC (2010)
-
(2010)
Network and Distributed Systems Security- NDSS 2010
-
-
Ristenpart, T.1
Yilek, S.2
-
33
-
-
79951798566
-
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service- Resistant Protocols
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C., Gonzalez Nieto, J.: Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 284-301. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 284-301
-
-
Stebila, D.1
Kuppusamy, L.2
Rangasamy, J.3
Boyd, C.4
Gonzalez Nieto, J.5
-
34
-
-
0026973508
-
Message authentication with one-way hash functions
-
IEEE
-
Tsudik, G.: Message authentication with one-way hash functions. In: Proceedings IEEE INFOCOM 1992, vol. 3, pp. 2055-2059. IEEE (1992)
-
(1992)
Proceedings IEEE INFOCOM 1992
, vol.3
, pp. 2055-2059
-
-
Tsudik, G.1
-
35
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auction
-
Wang, X.F., Reiter, M.K.: Defending against denial-of-service attacks with puzzle auction. In: IEEE Symposium on Security and Privacy, pp. 78-92 (2003)
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 78-92
-
-
Wang, X.F.1
Reiter, M.K.2
|