-
1
-
-
84888989157
-
Using SMT solvers to automate design tasks for encryption and signature schemes
-
November
-
Joseph A. Akinyele, Matthew Green, and Susan Hohenberger. Using SMT solvers to automate design tasks for encryption and signature schemes. In ACM CCS 2013, pages 399-410, November 2013.
-
(2013)
ACM CCS 2013
, pp. 399-410
-
-
Akinyele, J.A.1
Green, M.2
Hohenberger, S.3
-
2
-
-
84869480265
-
Machine-generated algorithms proofs and software for the batch verification of digital signature schemes
-
October
-
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, and Matthew W. Pagano. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. In ACM CCS 2012, pages 474-487, October 2012.
-
(2012)
ACM CCS 2012
, pp. 474-487
-
-
Akinyele, J.A.1
Green, M.2
Hohenberger, S.3
Pagano, M.W.4
-
3
-
-
84892395023
-
Parallelizable and authenticated online ciphers
-
December
-
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, and Kan Yasuda. Parallelizable and authenticated online ciphers. In Asiacrypt 2013, pages 424-443, December 2013.
-
(2013)
Asiacrypt 2013
, pp. 424-443
-
-
Andreeva, E.1
Bogdanov, A.2
Luykx, A.3
Mennink, B.4
Tischhauser, E.5
Yasuda, K.6
-
4
-
-
84889002380
-
Fully automated analysis of padding-based encryption in the computational model
-
November
-
Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, and Santiago Zanella Béguelin. Fully automated analysis of padding-based encryption in the computational model. In ACM CCS 2013, pages 1247-1260, November 2013.
-
(2013)
ACM CCS 2013
, pp. 1247-1260
-
-
Barthe, G.1
Manuel Crespo, J.2
Grégoire, B.3
Kunz, C.4
Lakhnech, Y.5
Schmidt, B.6
Béguelin, S.Z.7
-
5
-
-
84905384404
-
Automated analysis of cryptographic assumptions in generic group models
-
August
-
Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, and Benedikt Schmidt. Automated analysis of cryptographic assumptions in generic group models. In Crypto 2014, pages 95-112, August 2014.
-
(2014)
Crypto 2014
, pp. 95-112
-
-
Barthe, G.1
Fagerholm, E.2
Fiore, D.3
Mitchell, J.C.4
Scedrov, A.5
Schmidt, B.6
-
6
-
-
84925275413
-
Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds
-
March / April
-
Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, and Mehdi Tibouchi. Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds. In PKC 2015, pages 355-376, March / April 2015.
-
(2015)
PKC 2015
, pp. 355-376
-
-
Barthe, G.1
Fagerholm, E.2
Fiore, D.3
Scedrov, A.4
Schmidt, B.5
Tibouchi, M.6
-
7
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
October
-
Mihir Bellare and Chanathip Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology, 21(4):469-491, October 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
8
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
May / June
-
Mihir Bellare and Phillip Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. In Eurocrypt 2006, pages 409-426, May / June 2006.
-
(2006)
Eurocrypt 2006
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
84866650081
-
McOE: A family of almost foolproof on-line authenticated encryption schemes
-
March
-
Ewan Fleischmann, Christian Forler, and Stefan Lucks. McOE: A family of almost foolproof on-line authenticated encryption schemes. In FSE 2012, pages 196-215, March 2012.
-
(2012)
FSE 2012
, pp. 196-215
-
-
Fleischmann, E.1
Forler, C.2
Lucks, S.3
-
12
-
-
84958968987
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
April
-
Virgil D. Gligor and Pompiliu Donescu. Fast encryption and authentication: XCBC encryption and XECB authentication modes. In FSE 2001, pages 92-108, April 2002.
-
(2002)
FSE 2001
, pp. 92-108
-
-
Gligor, V.D.1
Donescu, P.2
-
14
-
-
84865459581
-
Breaking and repairing GCM security proofs
-
August
-
Tetsu Iwata, Keisuke Ohashi, and Kazuhiko Minematsu. Breaking and repairing GCM security proofs. In Crypto 2012, pages 31-49, August 2012.
-
(2012)
Crypto 2012
, pp. 31-49
-
-
Iwata, T.1
Ohashi, K.2
Minematsu, K.3
-
15
-
-
70549095310
-
BTM: A single-key, inverse-cipher-free mode for deterministic authenticated encryption
-
August
-
Tetsu Iwata and Kan Yasuda. BTM: A single-key, inverse-cipher-free mode for deterministic authenticated encryption. In SAC 2009, pages 313-330, August 2009.
-
(2009)
SAC 2009
, pp. 313-330
-
-
Iwata, T.1
Yasuda, K.2
-
16
-
-
84974720881
-
Unforgeable encryption and chosen ciphertext secure modes of operation
-
April
-
Jonathan Katz and Moti Yung. Unforgeable encryption and chosen ciphertext secure modes of operation. In FSE 2000, pages 284-299, April 2001.
-
(2001)
FSE 2000
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
17
-
-
79960002636
-
The software performance of authenticated-encryption modes
-
February
-
Ted Krovetz and Phillip Rogaway. The software performance of authenticated-encryption modes. In FSE 2011, pages 306-327, February 2011.
-
(2011)
FSE 2011
, pp. 306-327
-
-
Krovetz, T.1
Rogaway, P.2
-
19
-
-
84939610898
-
Automated analysis and synthesis of block-cipher modes of operation
-
July
-
Alex J. Malozemoff, Jonathan Katz, and Matthew D. Green. Automated analysis and synthesis of block-cipher modes of operation. In IEEE CSF 2014, pages 140-152, July 2014.
-
(2014)
IEEE CSF 2014
, pp. 140-152
-
-
Malozemoff, A.J.1
Katz, J.2
Green, M.D.3
-
20
-
-
33845303377
-
The security and performance of the Galois/counter mode (GCM) of operation
-
December
-
David A. McGrew and John Viega. The security and performance of the Galois/counter mode (GCM) of operation. In Indocrypt 2004, pages 343-355, December 2004.
-
(2004)
Indocrypt 2004
, pp. 343-355
-
-
McGrew, D.A.1
Viega, J.2
-
21
-
-
84901685934
-
Parallelizable rate-1 authenticated encryption from pseudorandom functions
-
May
-
Kazuhiko Minematsu. Parallelizable rate-1 authenticated encryption from pseudorandom functions. In Eurocrypt 2014, pages 275-292, May 2014.
-
(2014)
Eurocrypt 2014
, pp. 275-292
-
-
Minematsu, K.1
-
22
-
-
0037673324
-
Authenticated-encryption with associated-data
-
November
-
Phillip Rogaway. Authenticated-encryption with associated-data. In ACM CCS 2002, pages 98-107, November 2002.
-
(2002)
ACM CCS 2002
, pp. 98-107
-
-
Rogaway, P.1
-
23
-
-
33644958567
-
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
-
December
-
Phillip Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In Asiacrypt 2004, pages 16-31, December 2004.
-
(2004)
Asiacrypt 2004
, pp. 16-31
-
-
Rogaway, P.1
-
24
-
-
35048855085
-
Nonce-based symmetric encryption
-
February
-
Phillip Rogaway. Nonce-based symmetric encryption. In FSE 2004, pages 348-359, February 2004.
-
(2004)
FSE 2004
, pp. 348-359
-
-
Rogaway, P.1
-
25
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
November
-
Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In ACM CCS 2001, pages 196-205, November 2001.
-
(2001)
ACM CCS 2001
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
26
-
-
84954189548
-
Program synthesis using dual interpretation
-
August
-
Ashish Tiwari, Adrià Gascón, and Bruno Dutertre. Program synthesis using dual interpretation. In CADE 2015, August 2015.
-
(2015)
CADE 2015
-
-
Tiwari, A.1
Gascón, A.2
Dutertre, B.3
|