-
2
-
-
84937488217
-
A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation
-
M. BELLARE, A. DESAI, E. JOKIPII and P. ROGAWAY, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
-
(1997)
Proceedings of the 38Th Symposium on Foundations of Computer Science, IEEE
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
84983089516
-
The security of cipher block chaining
-
Y. Desmedt ed., Springer-Verlag
-
M. BELLARE, J. KILIAN and P. ROGAWAY, “The security of cipher block chaining,” Advances in Cryptology – Crypto ’94, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology – Crypto ’94, Lecture Notes in Computer Science
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
0001868672
-
Optimal asymmetric encryption - How to encrypt with RSA
-
A. De Santis ed., Springer-Verlag
-
M. BELLARE, P. ROGAWAY, “Optimal asymmetric encryption - How to encrypt with RSA,” Advances in Cryptology – Eurocrypt ’94, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology – Eurocrypt ’94, Lecture Notes in Computer Science
, vol.950
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84957063575
-
On the security properties of OAEP as an all-or-nothing transform
-
M. Wiener ed., Springer-Verlag
-
V. BOYKO, “On the security properties of OAEP as an all-or-nothing transform,”Advances in Cryptology – Crypto ’99, Lecture Notes in Computer Science Vol. 1666, M. Wiener ed., Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology – Crypto ’99, Lecture Notes in Computer Science
, vol.1666
-
-
Boyko, V.1
-
7
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
B. Preneel ed., Springer-Verlag
-
R. CANETTI, Y. DODIS, S. HALEVI, E. KUSHILEVITZ, A. SAHAI, “Exposure-resilient functions and all-or-nothing transforms,” Advances in Cryptology – Eurocrypt ’00, Lecture Notes in Computer Science Vol. 1807, B. Preneel ed., Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology – Eurocrypt ’00, Lecture Notes in Computer Science
, vol.1807
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
8
-
-
84974533982
-
The security of all-or-nothing encryption: Protecting against exhaustive key search
-
M. Bellare ed., Springer-Verlag
-
A. DESAI, “The security of all-or-nothing encryption: protecting against exhaustive key search,”Advances in Cryptology – Crypto ’00, Lecture Notes in Computer Science Vol. 1880, M. Bellare ed., Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology – Crypto ’00, Lecture Notes in Computer Science
, vol.1880
-
-
Desai, A.1
-
9
-
-
0022793132
-
How to construct random functions
-
O. GOLDREICH, S. GOLDWASSER and S. MICALI, “How to construct random functions,” Journal of the ACM, Vol. 33, No. 4, 210–217, (1986).
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
|