-
1
-
-
12444293717
-
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
-
M. Abdalla and M. Bellare, “Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques,” ASIACRYPT 2000.
-
(2000)
ASIACRYPT
-
-
Abdalla, M.1
Bellare, M.2
-
2
-
-
84947220682
-
High-Speed Pseudorandom Number Generation with Small Memory
-
W. Aiello, S. Rajagopalan, and R. Venkatsan, “High-Speed Pseudorandom Number Generation with Small Memory,” FSE 1999.
-
(1999)
FSE
-
-
Aiello, W.1
Rajagopalan, S.2
Venkatsan, R.3
-
3
-
-
84947246440
-
American National Standard for Financial Institution KeyManagemen t (Wholesale)
-
ANSI X9.17 (Revised)
-
ANSI X9.17 (Revised), “American National Standard for Financial Institution KeyManagemen t (Wholesale),” America Bankers Association, 1985.
-
(1985)
America Bankers Association
-
-
-
4
-
-
84947246440
-
American National Standard for Financial Institution KeyManagement (Wholesale)
-
ANSI X9.31
-
ANSI X9.31, “American National Standard for Financial Institution KeyManagement (Wholesale),” America Bankers Association, 2001.
-
(2001)
America Bankers Association
-
-
-
5
-
-
24944506988
-
“PreliminaryAnaly sis of the BSAFE 3.X Pseudorandom Number Generators
-
Bulletin No. 8
-
R. Baldwin, “PreliminaryAnaly sis of the BSAFE 3.x Pseudorandom Number Generators,” RSA Laboratories’ Bulletin No. 8, 1998.
-
(1998)
RSA Laboratories’
-
-
Baldwin, R.1
-
6
-
-
0002757750
-
Keying Hash Functions for Message Authentication
-
M. Bellare, R. Canetti and H. Krawczyk, “Keying Hash Functions for Message Authentication,” CRYPTO 1996.
-
(1996)
CRYPTO
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
0030416137
-
Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security
-
M. Bellare, R Canetti and H Krawczyk, “Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security,” FOCS 1996.
-
(1996)
FOCS
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
9
-
-
84945327416
-
“XOR MACs: New Methods for Message Authentication using Finite Pseudorandom Functions
-
M. Bellare, R. Guerin, and P. Rogaway, “XOR MACs: New Methods for Message Authentication using Finite Pseudorandom Functions,” CRYPTO 1995.
-
(1995)
CRYPTO
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
10
-
-
0003372190
-
The Securityof the Cipher Block Chaining Message Authentication Code
-
M. Bellare, J. Kilian and P. Rogaway, “The Securityof the Cipher Block Chaining Message Authentication Code,” CRYPTO 1994.
-
(1994)
CRYPTO
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
11
-
-
85016043072
-
Luby-Rackoff Backwards: Increasing Securityb ymaking Block Ciphers Non-Invertible
-
M. Bellare, T. Krovetz, and P. Rogaway, “Luby-Rackoff Backwards: Increasing Securityb ymaking Block Ciphers Non-Invertible,” EUROCRYPT 1998.
-
(1998)
EUROCRYPT
-
-
Bellare, M.1
Krovetz, T.2
Rogaway, P.3
-
12
-
-
18844420431
-
Forward Securityin Private-KeyCry ptography
-
Report 2001/035
-
M. Bellare and B. Yee, “Forward Securityin Private-KeyCry ptography,” Cryptology ePrint Archive, Report 2001/035.
-
Cryptology Eprint Archive
-
-
Bellare, M.1
Yee, B.2
-
13
-
-
84947290357
-
-
Lucent Technologies Press Release
-
D. Bleichenbacher, Lucent Technologies Press Release, http://www.lucent.com/press/0201/010205.bla.html.
-
-
-
Bleichenbacher, D.1
-
14
-
-
0022716288
-
A Simple Unpredictable Pseudorandom Number Generator
-
L. Blum, M. Blum, and M. Shub, “A Simple Unpredictable Pseudorandom Number Generator.” SIAM J. Computing, 15(2), 1986.
-
(1986)
SIAM J. Computing
, vol.15
, Issue.2
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
15
-
-
0021522644
-
“How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
-
M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudorandom Bits.” SIAM J. Computing, 13, 1984.
-
(1984)
SIAM J. Computing
, pp. 13
-
-
Blum, M.1
Micali, S.2
-
18
-
-
0001010820
-
Collisions for the Compression Function of MD5
-
B. Den Boer and A. Bosselaers, “Collisions for the Compression Function of MD5,” CRYPTO 1993.
-
(1993)
CRYPTO
-
-
Den Boer, B.1
Bosselaers, A.2
-
20
-
-
84947239511
-
Allen, “The TLS Protocol Version 1.0,” RFC 2246
-
T. Dierks, and C. Allen, “The TLS Protocol Version 1.0,” RFC 2246, Internet Request for Comments, 1999.
-
(1999)
Internet Request for Comments
-
-
Dierks, T.1
-
21
-
-
0001849866
-
The Status of MD5 After a Recent Attack, RSA Labs’
-
H. Dobbertin, “The Status of MD5 After a Recent Attack,” RSA Labs’ CryptoBytes, Vol.2 No.2, 1996.
-
(1996)
Cryptobytes
, vol.2
, Issue.2
-
-
Dobbertin, H.1
-
22
-
-
0003508562
-
-
FIPS PUB 186-2, National Institute of Standards and Technologies
-
FIPS PUB 186-2, “Digital Signature Standard,” National Institute of Standards and Technologies, 1994.
-
(1994)
Digital Signature Standard
-
-
-
23
-
-
0003508564
-
-
FIPS PUB 186-2 (Change Notice 1, National Institute of Standards and Technologies
-
FIPS PUB 186-2 (Change Notice 1), “Digital Signature Standard,” National Institute of Standards and Technologies, 2001.
-
(2001)
Digital Signature Standard,”
-
-
-
25
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, “How to Construct Random Functions,” Journal of the ACM, Vol. 33, N0. 4, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
26
-
-
85084160278
-
Software Generation of PracticallyStrong Random Numbers
-
P. Gutmann, “Software Generation of PracticallyStrong Random Numbers,” USENIX SecuritySy mposium 1998.
-
(1998)
USENIX Securitysy Mposium
-
-
Gutmann, P.1
-
28
-
-
0038126046
-
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
-
J. Kelsey, B. Schneier, and N. Ferguson, “Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator,” SAC 1999.
-
(1999)
SAC
-
-
Kelsey, J.1
Schneier, B.2
Ferguson, N.3
-
29
-
-
33745007262
-
Cryptanalytic Attacks on Pseudorandom Number Generators
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Cryptanalytic Attacks on Pseudorandom Number Generators,” FSE 1998.
-
(1998)
FSE
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
32
-
-
84957808673
-
Parallel Collision Search with Applications to Hash Functions and Discrete Logarithms
-
P. Van Oorschot and M. Wiener “Parallel Collision Search with Applications to Hash Functions and Discrete Logarithms,” ACM CCS 1994.
-
(1994)
ACM CCS
-
-
Van Oorschot, P.1
Wiener, M.2
-
34
-
-
0020301290
-
Theoryand Applications of Trapdoor Functions
-
A.C. Yao, “Theoryand Applications of Trapdoor Functions,” FOCS 1982.
-
(1982)
FOCS
-
-
Yao, A.C.1
|