-
1
-
-
84936847858
-
-
DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem. Contribution to IEEE P1363a.
-
M.Abdalla,, M.Bellare, and P.Rogaway. 1998. DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem. Contribution to IEEE P1363a. http://cseweb.ucsd.edu/users/mihir/papers/dhaes.pdf
-
(1998)
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
84937579774
-
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES,
-
M.Abdalla,, M.Bellare, and P.Rogaway. 2001. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, Lecture Notes in Computer Science, 2020:143–158.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
84936847859
-
-
The CAST-128 Encryption Algorithm. Internet Engineering Task Force, RFC 2144.
-
C.Adams, 1997. The CAST-128 Encryption Algorithm. Internet Engineering Task Force, RFC 2144. http://www.ietf.org/rfc/rfc2144.txt
-
(1997)
-
-
Adams, C.1
-
5
-
-
72449208565
-
Preimages for Step-Reduced SHA-2,
-
K.Aoki,, J.Guo, K.Matusiewicz, Y.Sasaki, and L.Wang. 2009. Preimages for Step-Reduced SHA-2, Lecture Notes in Computer Science, 5912:578–597.
-
(2009)
Lecture Notes in Computer Science
, vol.5912
, pp. 578-597
-
-
Aoki, K.1
Guo, J.2
Matusiewicz, K.3
Sasaki, Y.4
Wang, L.5
-
6
-
-
84949218850
-
Camellia: A 128-bit Block Cipher Suitable for Multiple Platforms—Design and Analysis,
-
K.Aoki,, T.Ichikawa, M.Kanda, M.Matsui, S.Moriai, J.Nakajima, and T.Tokita. 2001. Camellia: A 128-bit Block Cipher Suitable for Multiple Platforms—Design and Analysis, Lecture Notes in Computer Science, 2012:39–56.
-
(2001)
Lecture Notes in Computer Science
, vol.2012
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
7
-
-
33646760559
-
Minimizing the Use of Random Oracles in Authenticated Encryption Schemes,
-
M.Bellare,, and P.Rogaway. 1997. Minimizing the Use of Random Oracles in Authenticated Encryption Schemes, Lecture Notes in Computer Science, 1334:1–16.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 1-16
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84936847860
-
-
Related-key Cryptanalysis of the Full AES-192 and AES-256. Cryptology ePrint Archive, Report 2009/317.
-
A.Biryukov,, and D.Khovratovich. 2009. Related-key Cryptanalysis of the Full AES-192 and AES-256. Cryptology ePrint Archive, Report 2009/317. http://eprint.iacr.org/2009/317.pdf
-
(2009)
-
-
Biryukov, A.1
Khovratovich, D.2
-
9
-
-
82955173829
-
Second-Order Differential Collisions for Reduced SHA-256,
-
A.Biryukov,, M.Lamberger, F.Mendel, and I.Nikolic. 2011. Second-Order Differential Collisions for Reduced SHA-256, Lecture Notes in Computer Science, 7073:270–287.
-
(2011)
Lecture Notes in Computer Science
, vol.7073
, pp. 270-287
-
-
Biryukov, A.1
Lamberger, M.2
Mendel, F.3
Nikolic, I.4
-
11
-
-
84936847861
-
-
Biclique Cryptanalysis of the Full AES. Cryptology ePrint Archive, Report 2011/449.
-
A.Bogdanov,, D.Khovratovich, and C.Rechberger. 2011. Biclique Cryptanalysis of the Full AES. Cryptology ePrint Archive, Report 2011/449. http://eprint.iacr.org/2011/449.pdf.
-
(2011)
-
-
Bogdanov, A.1
Khovratovich, D.2
Rechberger, C.3
-
12
-
-
84936847862
-
-
Brainpool, ECC Brainpool Standard Curves and Curve Generation,
-
Brainpool. 2005. ECC Brainpool Standard Curves and Curve Generation, http://www.ecc-brainpool.org/download/Domain-parameters.pdf
-
(2005)
-
-
-
13
-
-
84936847863
-
-
Brainpool, Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. IETF RFC 5639.
-
Brainpool. 2010. Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. IETF RFC 5639. http://tools.ietf.org/html/rfc5639
-
(2010)
-
-
-
14
-
-
84936847864
-
-
Bundesamt für Sicherheit in der Informationstechnik, Elliptic Curve Cryptography. BSI TR 03111.
-
Bundesamt für Sicherheit in der Informationstechnik. 2009. Elliptic Curve Cryptography. BSI TR 03111. http://www.bsi.de/literat/tr/tr03111/BSI-TR-03111.pdf
-
(2009)
-
-
-
15
-
-
38549144112
-
Collisions for 70-step SHA-1: On the Full Cost of Collision Search,
-
C.D.Cannière,, F.Mendel, and C.Rechberger. 2007. Collisions for 70-step SHA-1: On the Full Cost of Collision Search, Lecture Notes in Computer Science, 4876:56–73.
-
(2007)
Lecture Notes in Computer Science
, vol.4876
, pp. 56-73
-
-
Cannière, C.D.1
Mendel, F.2
Rechberger, C.3
-
16
-
-
84958957924
-
RIPEMD-160: A Strengthened Version of RIPEMD,
-
H.Dobbertin,, A.Bosselaers, and B.Preneel. 1996. RIPEMD-160: A Strengthened Version of RIPEMD, Lecture Notes in Computer Science, 1039:71–82.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
17
-
-
84936847617
-
-
US Patent 6,199,086.
-
J.D.Dworkin,, M.J.Torla, P.M.Glaser, A.Vadekar, R.J.Lambert, and S.A.Vanstone. 2001. Circuit and Method for Decompressing Compressed Elliptic Curve Points. US Patent 6,199,086.
-
(2001)
Circuit and Method for Decompressing Compressed Elliptic Curve Points
-
-
Dworkin, J.D.1
Torla, M.J.2
Glaser, P.M.3
Vadekar, A.4
Lambert, R.J.5
Vanstone, S.A.6
-
18
-
-
84936847865
-
-
Lessons Learned on Implementing ECDSA on a Java Smart Card. In Proceedings of Nord Sec 2000. Reykjavik, Iceland, p. 1–12.
-
T.Elo, 2000. Lessons Learned on Implementing ECDSA on a Java Smart Card. In Proceedings of Nord Sec 2000. Reykjavik, Iceland, p. 1–12.
-
(2000)
-
-
Elo, T.1
-
19
-
-
78349279256
-
-
A Comparison of the Standardized Versions of ECIES. In Sixth International Conference on Information Assurance and Security (IAS 2010), Atlanta, GA, USA, p. 1–4.
-
V.Gayoso Martínez,, F.Hernández Álvarez, L.Hernández Encinas, and C.Sánchez Ávila. 2010. A Comparison of the Standardized Versions of ECIES. In Sixth International Conference on Information Assurance and Security (IAS 2010), Atlanta, GA, USA, p. 1–4.
-
(2010)
-
-
Gayoso Martínez, V.1
Hernández Álvarez, F.2
Hernández Encinas, L.3
Sánchez Ávila, C.4
-
20
-
-
84913620130
-
Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves,
-
V.Gayoso Martínez,, F.Hernández Álvarez, L.Hernández Encinas, and C.Sánchez Ávila. 2011. Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves, International Journal of Information Assurance and Security, 6(4):285–293.
-
(2011)
International Journal of Information Assurance and Security
, vol.6
, Issue.4
, pp. 285-293
-
-
Gayoso Martínez, V.1
Hernández Álvarez, F.2
Hernández Encinas, L.3
Sánchez Ávila, C.4
-
21
-
-
84936847867
-
-
Implementing the ECC Brainpool Curve Generation Procedure Using Open Source Software. In WorldComp 2013—International Conference on Security & Management (SAM'13), 22–25 July 2013, Las Vegas, CA, pp. 162–197.
-
V.Gayoso Martínez,, and L.Hernández Encinas. 2013. Implementing the ECC Brainpool Curve Generation Procedure Using Open Source Software. In WorldComp 2013—International Conference on Security & Management (SAM'13), 22–25 July 2013, Las Vegas, CA, pp. 162–197.
-
(2013)
-
-
Gayoso Martínez, V.1
Hernández Encinas, L.2
-
22
-
-
84936847868
-
-
A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. In WorldComp 2010—International Conference on Security & Management (SAM'10), 12–15 July 2010, Vol. II, Las Vegas, CA, pp. 495–501.
-
V.Gayoso Martínez,, L.Hernández Encinas, and C.Sánchez Ávila. 2010. A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. In WorldComp 2010—International Conference on Security & Management (SAM'10), 12–15 July 2010, Vol. II, Las Vegas, CA, pp. 495–501.
-
(2010)
-
-
Gayoso Martínez, V.1
Hernández Encinas, L.2
Sánchez Ávila, C.3
-
23
-
-
84936847869
-
-
SHA-512/256. Cryptology ePrint Archive, Report 2010/548.
-
S.Gueron,, S.Johnson, and J.Walker. 2010. SHA-512/256. Cryptology ePrint Archive, Report 2010/548. http://eprint.iacr.org/2010/548.pdf
-
(2010)
-
-
Gueron, S.1
Johnson, S.2
Walker, J.3
-
25
-
-
84936847870
-
-
Institute of Electrical and Electronics Engineers, Standard Specifications for Public Key Cryptography—Amendment 1: Additional Techniques. IEEE 1363a.
-
Institute of Electrical and Electronics Engineers. 2004. Standard Specifications for Public Key Cryptography—Amendment 1: Additional Techniques. IEEE 1363a.
-
(2004)
-
-
-
26
-
-
84936847871
-
-
International Organization for Standardization / International Electrotechnical Commission, Information Technology – Security Techniques – Hash-functions – Part 3: Dedicated Hash-functions. ISO/IEC 10118–3.
-
International Organization for Standardization / International Electrotechnical Commission. 2004. Information Technology – Security Techniques – Hash-functions – Part 3: Dedicated Hash-functions. ISO/IEC 10118–3.
-
(2004)
-
-
-
27
-
-
84936847872
-
-
International Organization for Standardization / International Electrotechnical Commission, Information Technology – Security Techniques – Encryption Algorithms – Part 2: Asymmetric Ciphers. ISO/IEC 18033–2.
-
International Organization for Standardization / International Electrotechnical Commission. 2006. Information Technology – Security Techniques – Encryption Algorithms – Part 2: Asymmetric Ciphers. ISO/IEC 18033–2.
-
(2006)
-
-
-
28
-
-
84936847597
-
An Elliptic Curve Based User Authentication Scheme with Smart Cards,
-
Z.Jia,, and Y.Zhang. 2006. An Elliptic Curve Based User Authentication Scheme with Smart Cards, Journal of Information Assurance and Security, 1:283–292.
-
(2006)
Journal of Information Assurance and Security
, vol.1
, pp. 283-292
-
-
Jia, Z.1
Zhang, Y.2
-
29
-
-
84866690142
-
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family,
-
D.Khovratovich,, C.Rechberger, and A.Savelieva. 2012. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family, Lecture Notes in Computer Science, 7549:244–263.
-
(2012)
Lecture Notes in Computer Science
, vol.7549
, pp. 244-263
-
-
Khovratovich, D.1
Rechberger, C.2
Savelieva, A.3
-
30
-
-
84968503742
-
Elliptic Curve Cryptosystems,
-
N.Koblitz, 1987. Elliptic Curve Cryptosystems, Mathematics of Computation, 48:203–209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
31
-
-
84936847873
-
-
HMAC: Keyed Hashing for Message Authentication. Internet Engineering Task Force, RFC 2104.
-
H.Krawczyk,, M.Bellare, and R.Canetti. 1997. HMAC: Keyed Hashing for Message Authentication. Internet Engineering Task Force, RFC 2104. http://www.ietf.org/rfc/rfc2104.txt
-
(1997)
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
32
-
-
84936847874
-
-
The SEED Encryption Algorithm. Internet Engineering Task Force, RFC 4269.
-
H.J.Lee,, S.J.Lee, J.H.Yoon, D.H.Cheon, and J.I.Lee. 2005. The SEED Encryption Algorithm. Internet Engineering Task Force, RFC 4269. http://www.ietf.org/rfc/rfc4269.txt
-
(2005)
-
-
Lee, H.J.1
Lee, S.J.2
Yoon, J.H.3
Cheon, D.H.4
Lee, J.I.5
-
33
-
-
84936847875
-
-
Comments to NIST Concerning AES Modes of Operations: CTR-mode Encryption. National Institute of Standards and Technology.
-
H.Lipmaa,, P.Rogaway, and D.Wagner. 2000. Comments to NIST Concerning AES Modes of Operations: CTR-mode Encryption. National Institute of Standards and Technology. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ctr/ctr-spec.pdf
-
(2000)
-
-
Lipmaa, H.1
Rogaway, P.2
Wagner, D.3
-
35
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Williams H.C., (ed), Springer, Berlin:
-
V.S.Miller, 1986. Use of elliptic curves in cryptography, in H.C.Williams, Ed., Advances in Cryptology: CRYPTO '85 Proceedings, Lecture Notes in Computer Science, Vol. 218, Springer, Berlin, 1986, pp. 417–426.
-
(1986)
Advances in Cryptology: CRYPTO '85 Proceedings, Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
36
-
-
0003508558
-
-
National Institute of Standards and Technology, NIST FIPS 197.
-
National Institute of Standards and Technology. 2001. Advanced Encryption Standard. NIST FIPS 197.
-
(2001)
Advanced Encryption Standard
-
-
-
37
-
-
0013091373
-
-
National Institute of Standards and Technology, NIST FIPS 198.
-
National Institute of Standards and Technology. 2002. The Keyed-hash Message Authentication Code. NIST FIPS 198.
-
(2002)
The Keyed-hash Message Authentication Code
-
-
-
38
-
-
84936846550
-
-
National Institute of Standards and Technology,
-
National Institute of Standards and Technology. 2005. NIST Comments on Cryptanalytic Attacks on SHA-1. http://csrc.nist.gov/groups/ST/hash/statement.html
-
(2005)
NIST Comments on Cryptanalytic Attacks on SHA-1
-
-
-
41
-
-
33751508709
-
-
National Institute of Standards and Technology, NIST SP 800–57.
-
National Institute of Standards and Technology. 2007. Recommendation for Key Management. Part 1: General. NIST SP 800–57.
-
(2007)
Recommendation for Key Management. Part 1: General
-
-
-
43
-
-
84883277124
-
-
National Institute of Standards and Technology, NIST FIPS 180–4.
-
National Institute of Standards and Technology. 2012. Secure Hash Standard. NIST FIPS 180–4.
-
(2012)
Secure Hash Standard
-
-
-
46
-
-
84936847876
-
-
Oracle Corp, Java Card Classic Platform SE 6. — System.
-
Oracle Corp. 2013. Java Card Classic Platform SE 6. — System. http://docs.oracle.com/javase/6/docs/api/java/lang/System.html#nanoTime%28%29.
-
(2013)
-
-
-
47
-
-
84936847877
-
-
Oracle Corp, Java Technology.
-
Oracle Corp. 2013. Java Technology. http://java.com/en/about.
-
(2013)
-
-
-
48
-
-
84936847878
-
-
Oracle Corp, Oracle Java Archieve
-
Oracle Corp. 2013. Oracle Java Archieve http://www.oracle.com/technetwork/java/archive-139210.html
-
(2013)
-
-
-
49
-
-
84936847879
-
-
Oracle Corporation, Java Card Classic Platform Specification 3.0.4
-
Oracle Corporation. 2012. Java Card Classic Platform Specification 3.0.4 http://www.oracle.com/technetwork/java/javame/javacard/download/specs-jsp-136430.html
-
(2012)
-
-
-
50
-
-
84936847880
-
-
Oracle Corporation, Java Card Platform Specification 2.2.2.
-
Oracle Corporation. 2012. Java Card Platform Specification 2.2.2. http://www.oracle.com/technetwork/java/javacard/specs-138637.html
-
(2012)
-
-
-
51
-
-
84936847881
-
-
ECIES — Security Evaluation of the Encryption Scheme and Primitives. Cryptrec.
-
J.Quisquater,, and F.Koeune. 2002. ECIES — Security Evaluation of the Encryption Scheme and Primitives. Cryptrec. http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1015_ECIES_report.pdf
-
(2002)
-
-
Quisquater, J.1
Koeune, F.2
-
52
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext attack,
-
C.Rackoff,, and D.R.Simon. 1992. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext attack, Lecture Notes in Computer Science, 576:433–444.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
53
-
-
68049120635
-
Elliptic Curve Cryptography with the TI-83,
-
B.Rice,, and B.Yankosky. 2009. Elliptic Curve Cryptography with the TI-83, Cryptologia, 33(2):125–141.
-
(2009)
Cryptologia
, vol.33
, Issue.2
, pp. 125-141
-
-
Rice, B.1
Yankosky, B.2
-
54
-
-
58549106211
-
New Collision Attacks Against up to 24-Step SHA-2,
-
S.Sanadhya,, and P.Sarkar. 2008. New Collision Attacks Against up to 24-Step SHA-2, Lecture Notes in Computer Science, 5365:91–103.
-
(2008)
Lecture Notes in Computer Science
, vol.5365
, pp. 91-103
-
-
Sanadhya, S.1
Sarkar, P.2
-
55
-
-
84936847882
-
-
Schneier on Security.
-
B.Schneier, 2011. Schneier on Security. http://www.schneier.com/blog/archives/2011/08/new_attack_on_a_1.html
-
(2011)
-
-
Schneier, B.1
-
57
-
-
84936847883
-
-
A Proposal for an ISO Standard for Public Key Encryption. Cryptology ePrint Archive, Report 2001/112.
-
V.Shoup, 2001. A Proposal for an ISO Standard for Public Key Encryption. Cryptology ePrint Archive, Report 2001/112. http://www.shoup.net/papers/iso-2_1.pdf
-
(2001)
-
-
Shoup, V.1
-
58
-
-
84936847884
-
-
Standards for Efficient Cryptography Group, Test Vectors for SEC 1. SECG GEC 2.
-
Standards for Efficient Cryptography Group. 1999. Test Vectors for SEC 1. SECG GEC 2. http://www.secg.org/download/aid-390/gec2.pdf
-
(1999)
-
-
-
59
-
-
84936847885
-
-
Standards for Efficient Cryptography Group, Recommended Elliptic Curve Domain Parameters. SECG SEC 1 ver. 2.
-
Standards for Efficient Cryptography Group. 2009. Recommended Elliptic Curve Domain Parameters. SECG SEC 1 ver. 2. http://www.secg.org/download/aid-780/sec1-v2.pdf
-
(2009)
-
-
-
60
-
-
84936847886
-
-
Evaluation Report on the ECIES Cryptosystem. Cryptrec.
-
J.Stern, 2002. Evaluation Report on the ECIES Cryptosystem. Cryptrec. http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1016_Stern.ECIES.pdf
-
(2002)
-
-
Stern, J.1
-
61
-
-
33751043313
-
-
US Patent 6,141,420.
-
S.A.Vanstone,, R.C.Mullin, and G.B.Agnew. 2000. Elliptic Curve Encryption Systems. US Patent 6,141,420.
-
(2000)
Elliptic Curve Encryption Systems
-
-
Vanstone, S.A.1
Mullin, R.C.2
Agnew, G.B.3
-
62
-
-
84936847887
-
-
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199.
-
X.Wang,, D.Feng, X.Lai, and H.Yu. 2004. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199. http://eprint.iacr.org/2004/199.pdf
-
(2004)
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
63
-
-
24944575304
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD,
-
X.Wang,, X.Lai, D.Feng, H.Chen, and X.Yu. 2005. Cryptanalysis of the Hash Functions MD4 and RIPEMD, Lecture Notes in Computer Science, 3494:1–18.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
64
-
-
33745171465
-
Finding Collisions in the Full SHA-1,
-
X.Wang,, Y.Yin, and H.Yu. 2005. Finding Collisions in the Full SHA-1, Lecture Notes in Computer Science, 3621:17–36.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
|