메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 517-530

Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84937436045     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 3
    • 34547363710 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation
    • M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proc. of the 38th IEEE FOCS, IEEE, 1997.
    • (1997) Proc. Of the 38Th IEEE FOCS, IEEE
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 4
    • 84957098723 scopus 로고    scopus 로고
    • Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier
    • M. Wiener ed., Springer-Verlag
    • M. Bellare, O. Goldreich and H. Krawczyk, “Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier,” Advances in Cryptology – Crypto ’99, LNCS Vol. 1666, M. Wiener ed., Springer-Verlag, 1999.
    • (1999) Advances in Cryptology – Crypto ’99, LNCS , vol.1666
    • Bellare, M.1    Goldreich, O.2    Krawczyk, H.3
  • 6
    • 84957701229 scopus 로고    scopus 로고
    • Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible
    • K. Nyberg ed., Springer-Verlag
    • M. Bellare, T. Krovetz and P. Rogaway, “Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible,” Advances in Cryptology – Eurocrypt ’98, LNCS Vol. 1403, K. Nyberg ed., Springer-Verlag, 1998.
    • (1998) Advances in Cryptology – Eurocrypt ’98, LNCS , vol.1403
    • Bellare, M.1    Krovetz, T.2    Rogaway, P.3
  • 7
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • M. Wiener ed., Springer- Verlag
    • M. Bellare and S. Miner, “A forward-secure digital signature scheme,” Advances in Cryptology – Crypto ’99, LNCS Vol. 1666, M. Wiener ed., Springer- Verlag, 1999.
    • (1999) Advances in Cryptology – Crypto ’99, LNCS , vol.1666
    • Bellare, M.1    Miner, S.2
  • 8
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
    • T. Okamoto ed., Springer-Verlag
    • M. Bellare and C. Namprempre, “Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm,” Advances in Cryptology – ASIACRYPT ’00, LNCS Vol. ??, T. Okamoto ed., Springer-Verlag, 2000. Available via http://www-cse.ucsd.edu/users/mihir.
    • (2000) Advances in Cryptology – ASIACRYPT ’00, LNCS
    • Bellare, M.1    Namprempre, C.2
  • 10
    • 0003291909 scopus 로고
    • Differential cryptanalysis of the Full 16-round DES
    • E. Brickell ed., Springer- Verlag
    • E. Biham and A. Shamir, “Differential cryptanalysis of the Full 16-round DES,” Advances in Cryptology – Crypto ’92, LNCS Vol. 740, E. Brickell ed., Springer- Verlag, 1992.
    • (1992) Advances in Cryptology – Crypto ’92, LNCS , vol.740
    • Biham, E.1    Shamir, A.2
  • 11
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • November
    • M. Blum and S. Micali, “How to generate cryptographically strong sequences of pseudo-random bits,” SIAM Journal on Computing, Vol. 13, No. 4, 850-864, November 1984.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 13
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser and S. Micali, “How to construct random functions,” Journal of the ACM, Vol. 33, No. 4, 1986, pp. 210–217.
    • (1986) Journal of the ACM , vol.33 , Issue.4 , pp. 210-217
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 15
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol
    • C. G¨unther, J-J. Quisquater, J. Vandewille ed., Springer- Verlag
    • C. G¨unther, “An identity-based key-exchange protocol,” Advances in Cryptology – Eurocrypt ’89, LNCS Vol. 434, J-J. Quisquater, J. Vandewille ed., Springer- Verlag, 1989.
    • (1989) Advances in Cryptology – Eurocrypt ’89, LNCS , vol.434
    • G¨unther, C.1
  • 17
    • 85028754650 scopus 로고
    • The first experimental cryptanalysis of the Data Encryption Standard
    • Y. Desmedt ed., Springer-Verlag
    • M. Matsui, “The first experimental cryptanalysis of the Data Encryption Standard,” Advances in Cryptology – Crypto ’94, LNCS Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
    • (1994) Advances in Cryptology – Crypto ’94, LNCS , vol.839
    • Matsui, M.1
  • 18
    • 0002952549 scopus 로고
    • Theory and applications of trapdoor functions
    • A. Yao, “Theory and applications of trapdoor functions,” Proc. of the 23rd IEEE FOCS, IEEE, 1982.
    • (1982) Proc. Of the 23Rd IEEE FOCS, IEEE
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.