메뉴 건너뛰기




Volumn 8616 LNCS, Issue PART 1, 2014, Pages 1-19

Security of symmetric encryption against mass surveillance

Author keywords

[No Author keywords available]

Indexed keywords

MONITORING;

EID: 84905405306     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44371-2_1     Document Type: Conference Paper
Times cited : (135)

References (31)
  • 1
    • 84900479019 scopus 로고    scopus 로고
    • Revealed: How US and UK Spy Agencies Defeat Internet Security and Privacy
    • September 5
    • Ball, J., Borger, J., Greenwald, G.: Revealed: How US and UK Spy Agencies Defeat Internet Security and Privacy. The Guardian (September 5, 2013)
    • (2013) The Guardian
    • Ball, J.1    Borger, J.2    Greenwald, G.3
  • 2
    • 0031351741 scopus 로고    scopus 로고
    • A Concrete Security Treatment of Symmetric Encryption
    • IEEE
    • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: 38th FOCS. IEEE (1997)
    • (1997) 38th FOCS
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 3
    • 0037673373 scopus 로고    scopus 로고
    • Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol
    • ACM
    • Bellare, M., Kohno, T., Namprempre, C.: Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol. In: ACM CCS 2002. ACM (2002)
    • (2002) ACM CCS 2002
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 4
    • 84905399436 scopus 로고    scopus 로고
    • Security of Symmetric Encryption against Mass Surveillance
    • Full version of this paper. Report 2014/438
    • Bellare, M., Paterson, K., Rogaway, P.: Security of Symmetric Encryption against Mass Surveillance. Full version of this paper. Cryptology ePrint Archive, Report 2014/438 (2014)
    • (2014) Cryptology ePrint Archive
    • Bellare, M.1    Paterson, K.2    Rogaway, P.3
  • 5
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Encode-then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 317-330. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84958968987 scopus 로고    scopus 로고
    • Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
    • Matsui, M. (ed.) FSE 2001. Springer, Heidelberg
    • Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92-108. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2355 , pp. 92-108
    • Gligor, V.D.1    Donescu, P.2
  • 9
    • 35248841071 scopus 로고    scopus 로고
    • The Design and Implementation of Protocol-Based Hidden Key Recovery
    • Boyd, C., Mao, W. (eds.) ISC 2003. Springer, Heidelberg
    • Goh, E.-J., Boneh, D., Pinkas, B., Golle, P.: The Design and Implementation of Protocol-Based Hidden Key Recovery. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 165-179. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2851 , pp. 165-179
    • Goh, E.-J.1    Boneh, D.2    Pinkas, B.3    Golle, P.4
  • 11
    • 85008172715 scopus 로고
    • Invariant Signatures and Non-Interactive Zero- Knowledge Proofs are Equivalent
    • (Extended Abstract). Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Goldwasser, S., Ostrovsky, R.: Invariant Signatures and Non-Interactive Zero- Knowledge Proofs are Equivalent (Extended Abstract). In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 228-245. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 228-245
    • Goldwasser, S.1    Ostrovsky, R.2
  • 12
    • 35248863065 scopus 로고    scopus 로고
    • A Tweakable Enciphering Mode
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Halevi, S., Rogaway, P.: A Tweakable Enciphering Mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482-499. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 13
    • 35048894821 scopus 로고    scopus 로고
    • A Parallelizable Enciphering Mode
    • Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
    • Halevi, S., Rogaway, P.: A Parallelizable Enciphering Mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 292-304. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 292-304
    • Halevi, S.1    Rogaway, P.2
  • 14
    • 51249101305 scopus 로고    scopus 로고
    • Encryption Modes with Almost Free Message Integrity
    • Jutla, C.: Encryption Modes with Almost Free Message Integrity. Journal of Cryptology 21(4), 547-578 (2008)
    • (2008) Journal of Cryptology , vol.21 , Issue.4 , pp. 547-578
    • Jutla, C.1
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 16
    • 84937425161 scopus 로고    scopus 로고
    • Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Lysyanskaya, A.: Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 597-612. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 597-612
    • Lysyanskaya, A.1
  • 18
    • 84901650552 scopus 로고    scopus 로고
    • Reconsidering Generic Composition
    • Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. Springer, Heidelberg
    • Namprempre, C., Rogaway, P., Shrimpton, T.: Reconsidering Generic Composition. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 257-274. Springer, Heidelberg (2014)
    • (2014) LNCS , vol.8441 , pp. 257-274
    • Namprempre, C.1    Rogaway, P.2    Shrimpton, T.3
  • 19
    • 0010537086 scopus 로고    scopus 로고
    • Asymmetric Cryptography with S-Boxes
    • Han, Y., Quing, S. (eds.) ICICS 1997. Springer, Heidelberg
    • Patarin, J., Goubin, L.: Asymmetric Cryptography with S-Boxes. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 369-380. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1334 , pp. 369-380
    • Patarin, J.1    Goubin, L.2
  • 20
    • 84957699140 scopus 로고    scopus 로고
    • Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
    • Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
    • Paterson, K.G.: Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 201-214. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1636 , pp. 201-214
    • Paterson, K.G.1
  • 21
    • 84947909705 scopus 로고    scopus 로고
    • A Family of Trapdoor Ciphers
    • Biham, E. (ed.) FSE 1997. Springer, Heidelberg
    • Rijmen, V., Preneel, B.: A Family of Trapdoor Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 139-148. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1267 , pp. 139-148
    • Rijmen, V.1    Preneel, B.2
  • 22
    • 0037673324 scopus 로고    scopus 로고
    • Authenticated-Encryption with Associated-Data
    • ACM
    • Rogaway, P.: Authenticated-Encryption with Associated-Data. In: ACM CCS 2002. ACM (2002)
    • (2002) ACM CCS 2002
    • Rogaway, P.1
  • 23
    • 35048855085 scopus 로고    scopus 로고
    • Nonce-Based Symmetric Encryption
    • Roy, B., Meier, W. (eds.) FSE 2004. Springer, Heidelberg
    • Rogaway, P.: Nonce-Based Symmetric Encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3017 , pp. 348-359
    • Rogaway, P.1
  • 24
    • 0001217738 scopus 로고
    • The Prisoners' Problem and the Subliminal Channel
    • Springer
    • Simmons, G.: The Prisoners' Problem and the Subliminal Channel. In: CRYPTO 1983. Springer (1983)
    • (1983) CRYPTO 1983
    • Simmons, G.1
  • 26
    • 84976781807 scopus 로고
    • Reflections on Trusting Trust
    • Thompson, K.: Reflections on Trusting Trust. Commun. ACM 27(8), 761-763 (1984)
    • (1984) Commun. ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 27
    • 84955586344 scopus 로고    scopus 로고
    • The Dark Side of 'Black-Box' Cryptography, or: Should We Trust Capstone?
    • Advances in Cryptology - CRYPTO '96
    • Young, A., Yung, M.: The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 89-103. Springer, Heidelberg (1996) (Pubitemid 126106233)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 28
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against Cryptography
    • Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Young, A., Yung, M.: Kleptography: Using cryptography against Cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 62-74. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 62-74
    • Young, A.1    Yung, M.2
  • 29
    • 33645586625 scopus 로고    scopus 로고
    • Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
    • Vaudenay, S. (ed.) FSE 1998. Springer, Heidelberg
    • Young, A., Yung, M.: Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, p. 122. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1372 , pp. 122
    • Young, A.1    Yung, M.2
  • 31
    • 63449099506 scopus 로고    scopus 로고
    • Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts
    • Information Security and Privacy
    • Young, A., Yung, M.: Backdoor Attacks on Black-Box Ciphers Exploiting Low- Entropy Plaintexts. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 297-311. Springer, Heidelberg (2003) (Pubitemid 36892643)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2727 , pp. 297-311
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.