메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 275-288

Using hash functions as a hedge against chosen ciphertext attack

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84948976239     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_19     Document Type: Conference Paper
Times cited : (108)

References (29)
  • 1
    • 84949014932 scopus 로고    scopus 로고
    • DHAES: An encryption scheme based on the Diffie-Hellma problem
    • ABR98. M. Abdalla, M. Bellare, and P. Rogaway. DHAES: an encryption scheme based on the Diffie-Hellma problem. Submission, to IEEE P13631998.
    • (1998) Submission
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 84947778144 scopus 로고    scopus 로고
    • The Decision Diffie-Hellman Problem
    • Springer LNCS
    • Bon98. D. Boneh. The Decision Diffie-Hellman Problem. In Ants-III, pages 48-63, 1998. Springer LNCS 1423.
    • (1998) Ants-Iii , pp. 48-63
    • Boneh, D.1
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • CS98. R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology-Crypto ’98, pages 13-25, 1998.
    • (1998) Advances in Cryptology-Crypto ’98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 13
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • FO99. E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology-Crypto ’99, pages 537-554, 1999.
    • (1999) Advances in Cryptology-Crypto ’99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 15
  • 16
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • LL94. C. H. Lim and P. J. Lee. More flexible exponentiation with precomputation. In Advances in Cryptology-Crypto ’94, pages 95-107, 1994.
    • (1994) Advances in Cryptology-Crypto ’94 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 18
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Mau94. U. Maurer. Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. In Advances in Cryptology-Crypto ’94, pages 271-281, 1994.
    • (1994) Advances in Cryptology-Crypto ’94 , pp. 271-281
    • Maurer, U.1
  • 22
    • 84974554584 scopus 로고
    • Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack
    • RS91. C. Rackoff and D. Simon. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology-Crypto ’91, pages 433-444, 1991.
    • (1991) Advances in Cryptology-Crypto ’91 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 24
    • 0000164225 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Sho97. V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-Eurocrypt ’97, 1997.
    • (1997) Advances in Cryptology-Eurocrypt ’97
    • Shoup, V.1
  • 25
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • April
    • Sho99. V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120, April 1999.
    • (1999) IBM Research Report RZ , vol.3120
    • Shoup, V.1
  • 26
    • 84948968075 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • Sho00. V. Shoup. A composition theorem for universal one-way hash functions. In Advances in Cryptology-Eurocrypt 2000, pages 445-452, 2000.
    • (2000) Advances in Cryptology-Eurocrypt 2000 , pp. 445-452
    • Shoup, V.1
  • 28
    • 0005044302 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • TY98. Y. Tsiounis and M. Yung. On the security of ElGamal based encryption. In PKC ’98, 1998.
    • (1998) PKC ’98
    • Tsiounis, Y.1    Yung, M.2
  • 29
    • 85028933312 scopus 로고
    • Practical approaches to attaining security against adaptively chosen ciphertext attacks
    • ZS92. Y. Zheng and J. Seberry. Practical approaches to attaining security against adaptively chosen ciphertext attacks. In Advances in Cryptology-Crypto ’92, pages 292-304, 1992.
    • (1992) Advances in Cryptology-Crypto ’92 , pp. 292-304
    • Zheng, Y.1    Seberry, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.