-
1
-
-
84900479019
-
Revealed: How US and UK Spy Agencies Defeat Internet Security and Privacy
-
September 5
-
Ball, J., Borger, J., Greenwald, G.: Revealed: How US and UK Spy Agencies Defeat Internet Security and Privacy. The Guardian (September 5, 2013)
-
(2013)
The Guardian
-
-
Ball, J.1
Borger, J.2
Greenwald, G.3
-
2
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption
-
IEEE
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: 38th FOCS. IEEE (1997)
-
(1997)
38th FOCS
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
0037673373
-
Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol
-
ACM
-
Bellare, M., Kohno, T., Namprempre, C.: Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol. In: ACM CCS 2002. ACM (2002)
-
(2002)
ACM CCS 2002
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
4
-
-
84905399436
-
Security of Symmetric Encryption against Mass Surveillance
-
Full version of this paper. Report 2014/438
-
Bellare, M., Paterson, K., Rogaway, P.: Security of Symmetric Encryption against Mass Surveillance. Full version of this paper. Cryptology ePrint Archive, Report 2014/438 (2014)
-
(2014)
Cryptology ePrint Archive
-
-
Bellare, M.1
Paterson, K.2
Rogaway, P.3
-
5
-
-
84937429718
-
Encode-then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Encode-then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 317-330. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
76849086598
-
IP Covert Channel Detection
-
Cabuk, S., Brodley, C., Shields, C.: IP Covert Channel Detection. ACM Trans. Inf. Syst. Secur. 12(4) (2009)
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.4
-
-
Cabuk, S.1
Brodley, C.2
Shields, C.3
-
7
-
-
85076272293
-
On the Practical Exploitability of Dual EC in TLS Implementations
-
Checkoway, S., Fredrikson, M., Niederhagen, R., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D.J., Maskiewicz, J., Shacham, H.: On the Practical Exploitability of Dual EC in TLS Implementations. In: USENIX Security Symposium (2014)
-
USENIX Security Symposium (2014)
-
-
Checkoway, S.1
Fredrikson, M.2
Niederhagen, R.3
Everspaugh, A.4
Green, M.5
Lange, T.6
Ristenpart, T.7
Bernstein, D.J.8
Maskiewicz, J.9
Shacham, H.10
-
8
-
-
84958968987
-
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
-
Matsui, M. (ed.) FSE 2001. Springer, Heidelberg
-
Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92-108. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2355
, pp. 92-108
-
-
Gligor, V.D.1
Donescu, P.2
-
9
-
-
35248841071
-
The Design and Implementation of Protocol-Based Hidden Key Recovery
-
Boyd, C., Mao, W. (eds.) ISC 2003. Springer, Heidelberg
-
Goh, E.-J., Boneh, D., Pinkas, B., Golle, P.: The Design and Implementation of Protocol-Based Hidden Key Recovery. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 165-179. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2851
, pp. 165-179
-
-
Goh, E.-J.1
Boneh, D.2
Pinkas, B.3
Golle, P.4
-
11
-
-
85008172715
-
Invariant Signatures and Non-Interactive Zero- Knowledge Proofs are Equivalent
-
(Extended Abstract). Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Goldwasser, S., Ostrovsky, R.: Invariant Signatures and Non-Interactive Zero- Knowledge Proofs are Equivalent (Extended Abstract). In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 228-245. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 228-245
-
-
Goldwasser, S.1
Ostrovsky, R.2
-
12
-
-
35248863065
-
A Tweakable Enciphering Mode
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Halevi, S., Rogaway, P.: A Tweakable Enciphering Mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482-499. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
13
-
-
35048894821
-
A Parallelizable Enciphering Mode
-
Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
-
Halevi, S., Rogaway, P.: A Parallelizable Enciphering Mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 292-304. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 292-304
-
-
Halevi, S.1
Rogaway, P.2
-
14
-
-
51249101305
-
Encryption Modes with Almost Free Message Integrity
-
Jutla, C.: Encryption Modes with Almost Free Message Integrity. Journal of Cryptology 21(4), 547-578 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 547-578
-
-
Jutla, C.1
-
15
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
16
-
-
84937425161
-
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Lysyanskaya, A.: Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 597-612. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 597-612
-
-
Lysyanskaya, A.1
-
18
-
-
84901650552
-
Reconsidering Generic Composition
-
Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. Springer, Heidelberg
-
Namprempre, C., Rogaway, P., Shrimpton, T.: Reconsidering Generic Composition. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 257-274. Springer, Heidelberg (2014)
-
(2014)
LNCS
, vol.8441
, pp. 257-274
-
-
Namprempre, C.1
Rogaway, P.2
Shrimpton, T.3
-
19
-
-
0010537086
-
Asymmetric Cryptography with S-Boxes
-
Han, Y., Quing, S. (eds.) ICICS 1997. Springer, Heidelberg
-
Patarin, J., Goubin, L.: Asymmetric Cryptography with S-Boxes. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 369-380. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1334
, pp. 369-380
-
-
Patarin, J.1
Goubin, L.2
-
20
-
-
84957699140
-
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
-
Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
-
Paterson, K.G.: Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 201-214. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1636
, pp. 201-214
-
-
Paterson, K.G.1
-
21
-
-
84947909705
-
A Family of Trapdoor Ciphers
-
Biham, E. (ed.) FSE 1997. Springer, Heidelberg
-
Rijmen, V., Preneel, B.: A Family of Trapdoor Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 139-148. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1267
, pp. 139-148
-
-
Rijmen, V.1
Preneel, B.2
-
22
-
-
0037673324
-
Authenticated-Encryption with Associated-Data
-
ACM
-
Rogaway, P.: Authenticated-Encryption with Associated-Data. In: ACM CCS 2002. ACM (2002)
-
(2002)
ACM CCS 2002
-
-
Rogaway, P.1
-
23
-
-
35048855085
-
Nonce-Based Symmetric Encryption
-
Roy, B., Meier, W. (eds.) FSE 2004. Springer, Heidelberg
-
Rogaway, P.: Nonce-Based Symmetric Encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 348-359
-
-
Rogaway, P.1
-
24
-
-
0001217738
-
The Prisoners' Problem and the Subliminal Channel
-
Springer
-
Simmons, G.: The Prisoners' Problem and the Subliminal Channel. In: CRYPTO 1983. Springer (1983)
-
(1983)
CRYPTO 1983
-
-
Simmons, G.1
-
26
-
-
84976781807
-
Reflections on Trusting Trust
-
Thompson, K.: Reflections on Trusting Trust. Commun. ACM 27(8), 761-763 (1984)
-
(1984)
Commun. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
27
-
-
84955586344
-
The Dark Side of 'Black-Box' Cryptography, or: Should We Trust Capstone?
-
Advances in Cryptology - CRYPTO '96
-
Young, A., Yung, M.: The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 89-103. Springer, Heidelberg (1996) (Pubitemid 126106233)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 89-103
-
-
Young, A.1
Yung, M.2
-
28
-
-
84957360674
-
Kleptography: Using cryptography against Cryptography
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Young, A., Yung, M.: Kleptography: Using cryptography against Cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 62-74. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 62-74
-
-
Young, A.1
Yung, M.2
-
29
-
-
33645586625
-
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
-
Vaudenay, S. (ed.) FSE 1998. Springer, Heidelberg
-
Young, A., Yung, M.: Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, p. 122. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1372
, pp. 122
-
-
Young, A.1
Yung, M.2
-
30
-
-
24144439304
-
A subliminal channel in secret block ciphers
-
Young, A., Yung, M.: A Subliminal Channel in Secret Block Ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 198-211. Springer, Heidelberg (2004) (Pubitemid 39743823)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3357
, pp. 198-211
-
-
Young, A.1
Yung, M.2
-
31
-
-
63449099506
-
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts
-
Information Security and Privacy
-
Young, A., Yung, M.: Backdoor Attacks on Black-Box Ciphers Exploiting Low- Entropy Plaintexts. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 297-311. Springer, Heidelberg (2003) (Pubitemid 36892643)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2727
, pp. 297-311
-
-
Young, A.1
Yung, M.2
|