메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 84-95

Automated analysis and synthesis of authenticated encryption schemes

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTOMATION;

EID: 84954103143     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813636     Document Type: Conference Paper
Times cited : (21)

References (26)
  • 1
    • 84888989157 scopus 로고    scopus 로고
    • Using SMT solvers to automate design tasks for encryption and signature schemes
    • November
    • Joseph A. Akinyele, Matthew Green, and Susan Hohenberger. Using SMT solvers to automate design tasks for encryption and signature schemes. In ACM CCS 2013, pages 399-410, November 2013.
    • (2013) ACM CCS 2013 , pp. 399-410
    • Akinyele, J.A.1    Green, M.2    Hohenberger, S.3
  • 2
    • 84869480265 scopus 로고    scopus 로고
    • Machine-generated algorithms proofs and software for the batch verification of digital signature schemes
    • October
    • Joseph A. Akinyele, Matthew Green, Susan Hohenberger, and Matthew W. Pagano. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. In ACM CCS 2012, pages 474-487, October 2012.
    • (2012) ACM CCS 2012 , pp. 474-487
    • Akinyele, J.A.1    Green, M.2    Hohenberger, S.3    Pagano, M.W.4
  • 4
    • 84889002380 scopus 로고    scopus 로고
    • Fully automated analysis of padding-based encryption in the computational model
    • November
    • Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, and Santiago Zanella Béguelin. Fully automated analysis of padding-based encryption in the computational model. In ACM CCS 2013, pages 1247-1260, November 2013.
    • (2013) ACM CCS 2013 , pp. 1247-1260
    • Barthe, G.1    Manuel Crespo, J.2    Grégoire, B.3    Kunz, C.4    Lakhnech, Y.5    Schmidt, B.6    Béguelin, S.Z.7
  • 5
    • 84905384404 scopus 로고    scopus 로고
    • Automated analysis of cryptographic assumptions in generic group models
    • August
    • Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, and Benedikt Schmidt. Automated analysis of cryptographic assumptions in generic group models. In Crypto 2014, pages 95-112, August 2014.
    • (2014) Crypto 2014 , pp. 95-112
    • Barthe, G.1    Fagerholm, E.2    Fiore, D.3    Mitchell, J.C.4    Scedrov, A.5    Schmidt, B.6
  • 6
    • 84925275413 scopus 로고    scopus 로고
    • Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds
    • March / April
    • Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, and Mehdi Tibouchi. Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds. In PKC 2015, pages 355-376, March / April 2015.
    • (2015) PKC 2015 , pp. 355-376
    • Barthe, G.1    Fagerholm, E.2    Fiore, D.3    Scedrov, A.4    Schmidt, B.5    Tibouchi, M.6
  • 7
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • October
    • Mihir Bellare and Chanathip Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology, 21(4):469-491, October 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.4 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 8
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • May / June
    • Mihir Bellare and Phillip Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. In Eurocrypt 2006, pages 409-426, May / June 2006.
    • (2006) Eurocrypt 2006 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 84866650081 scopus 로고    scopus 로고
    • McOE: A family of almost foolproof on-line authenticated encryption schemes
    • March
    • Ewan Fleischmann, Christian Forler, and Stefan Lucks. McOE: A family of almost foolproof on-line authenticated encryption schemes. In FSE 2012, pages 196-215, March 2012.
    • (2012) FSE 2012 , pp. 196-215
    • Fleischmann, E.1    Forler, C.2    Lucks, S.3
  • 12
    • 84958968987 scopus 로고    scopus 로고
    • Fast encryption and authentication: XCBC encryption and XECB authentication modes
    • April
    • Virgil D. Gligor and Pompiliu Donescu. Fast encryption and authentication: XCBC encryption and XECB authentication modes. In FSE 2001, pages 92-108, April 2002.
    • (2002) FSE 2001 , pp. 92-108
    • Gligor, V.D.1    Donescu, P.2
  • 14
    • 84865459581 scopus 로고    scopus 로고
    • Breaking and repairing GCM security proofs
    • August
    • Tetsu Iwata, Keisuke Ohashi, and Kazuhiko Minematsu. Breaking and repairing GCM security proofs. In Crypto 2012, pages 31-49, August 2012.
    • (2012) Crypto 2012 , pp. 31-49
    • Iwata, T.1    Ohashi, K.2    Minematsu, K.3
  • 15
    • 70549095310 scopus 로고    scopus 로고
    • BTM: A single-key, inverse-cipher-free mode for deterministic authenticated encryption
    • August
    • Tetsu Iwata and Kan Yasuda. BTM: A single-key, inverse-cipher-free mode for deterministic authenticated encryption. In SAC 2009, pages 313-330, August 2009.
    • (2009) SAC 2009 , pp. 313-330
    • Iwata, T.1    Yasuda, K.2
  • 16
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable encryption and chosen ciphertext secure modes of operation
    • April
    • Jonathan Katz and Moti Yung. Unforgeable encryption and chosen ciphertext secure modes of operation. In FSE 2000, pages 284-299, April 2001.
    • (2001) FSE 2000 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 17
    • 79960002636 scopus 로고    scopus 로고
    • The software performance of authenticated-encryption modes
    • February
    • Ted Krovetz and Phillip Rogaway. The software performance of authenticated-encryption modes. In FSE 2011, pages 306-327, February 2011.
    • (2011) FSE 2011 , pp. 306-327
    • Krovetz, T.1    Rogaway, P.2
  • 18
    • 84937407660 scopus 로고    scopus 로고
    • Tweakable block ciphers
    • August
    • Moses Liskov, Ronald L. Rivest, and David Wagner. Tweakable block ciphers. In Crypto 2002, pages 31-46, August 2002.
    • (2002) Crypto 2002 , pp. 31-46
    • Liskov, M.1    Rivest, R.L.2    Wagner, D.3
  • 19
    • 84939610898 scopus 로고    scopus 로고
    • Automated analysis and synthesis of block-cipher modes of operation
    • July
    • Alex J. Malozemoff, Jonathan Katz, and Matthew D. Green. Automated analysis and synthesis of block-cipher modes of operation. In IEEE CSF 2014, pages 140-152, July 2014.
    • (2014) IEEE CSF 2014 , pp. 140-152
    • Malozemoff, A.J.1    Katz, J.2    Green, M.D.3
  • 20
    • 33845303377 scopus 로고    scopus 로고
    • The security and performance of the Galois/counter mode (GCM) of operation
    • December
    • David A. McGrew and John Viega. The security and performance of the Galois/counter mode (GCM) of operation. In Indocrypt 2004, pages 343-355, December 2004.
    • (2004) Indocrypt 2004 , pp. 343-355
    • McGrew, D.A.1    Viega, J.2
  • 21
    • 84901685934 scopus 로고    scopus 로고
    • Parallelizable rate-1 authenticated encryption from pseudorandom functions
    • May
    • Kazuhiko Minematsu. Parallelizable rate-1 authenticated encryption from pseudorandom functions. In Eurocrypt 2014, pages 275-292, May 2014.
    • (2014) Eurocrypt 2014 , pp. 275-292
    • Minematsu, K.1
  • 22
    • 0037673324 scopus 로고    scopus 로고
    • Authenticated-encryption with associated-data
    • November
    • Phillip Rogaway. Authenticated-encryption with associated-data. In ACM CCS 2002, pages 98-107, November 2002.
    • (2002) ACM CCS 2002 , pp. 98-107
    • Rogaway, P.1
  • 23
    • 33644958567 scopus 로고    scopus 로고
    • Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
    • December
    • Phillip Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In Asiacrypt 2004, pages 16-31, December 2004.
    • (2004) Asiacrypt 2004 , pp. 16-31
    • Rogaway, P.1
  • 24
    • 35048855085 scopus 로고    scopus 로고
    • Nonce-based symmetric encryption
    • February
    • Phillip Rogaway. Nonce-based symmetric encryption. In FSE 2004, pages 348-359, February 2004.
    • (2004) FSE 2004 , pp. 348-359
    • Rogaway, P.1
  • 25
    • 0035750947 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • November
    • Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In ACM CCS 2001, pages 196-205, November 2001.
    • (2001) ACM CCS 2001 , pp. 196-205
    • Rogaway, P.1    Bellare, M.2    Black, J.3    Krovetz, T.4
  • 26
    • 84954189548 scopus 로고    scopus 로고
    • Program synthesis using dual interpretation
    • August
    • Ashish Tiwari, Adrià Gascón, and Bruno Dutertre. Program synthesis using dual interpretation. In CADE 2015, August 2015.
    • (2015) CADE 2015
    • Tiwari, A.1    Gascón, A.2    Dutertre, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.