메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-527

Introduction to modern cryptography

(2)  Katz, Jonathan a   Lindell, Yehuda a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85122602758     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Book
Times cited : (1419)

References (149)
  • 5
    • 0023985196 scopus 로고
    • RSA and Rabin functions: Certain parts are as hard as the whole.
    • W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr. RSA and Rabin functions: Certain parts are as hard as the whole. SIAM Journal on Computing, 17(2):194-209, 1988.
    • (1988) SIAM Journal on Computing, , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 7
    • 15544367850 scopus 로고    scopus 로고
    • Online link can be found at
    • P. Barreto. The hashing function lounge. Online link can be found at http://paginas.terra.com.br/informatica/paulobarreto.
    • The hashing function lounge.
    • Barreto, P.1
  • 11
    • 38149125785 scopus 로고    scopus 로고
    • The power of verification queries in message authentication and authenticated encryption.
    • Available at
    • M. Bellare, O. Goldreich, and A. Mityagin. The power of verification queries in message authentication and authenticated encryption. Available at http://eprint.iacr.org/2004/309.
    • Bellare, M.1    Goldreich, O.2    Mityagin, A.3
  • 12
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code.
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, 2000.
    • (2000) Journal of Computer and System Sciences, , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 17
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs.
    • Springer,A full version of the paper is available at
    • M. Bellare and P. Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. In Advances in Cryp-tology - Eurocrypt 2006, volume 4004 of Lecture Notes in Computer Science, pages 409-426. Springer, 2006. A full version of the paper is available at http://eprint.iacr.org.
    • (2006) In Advances in Cryp-tology - Eurocrypt 2006, of Lecture Notes in Computer Science, , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 18
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryposystems.
    • E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryposystems. Journal of Cryptology, 4(1):3-72, 1991.
    • (1991) Journal of Cryptology, , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 21
    • 0003030602 scopus 로고
    • Coin flipping by telephone.
    • M. Blum. Coin flipping by telephone. In Proc. IEEE COMPCOM, pages 133-137, 1982.
    • (1982) In Proc. IEEE COMPCOM, , pp. 133-137
    • Blum, M.1
  • 23
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits.
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, 1984.
    • (1984) SIAM Journal on Computing, , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 25
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem.
    • D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society, 46(2):203-213, 1999.
    • (1999) Notices of the American Mathematical Society, , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 30
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited.
    • R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. Journal of the ACM, 51(4):557-594, 2004.
    • (2004) Journal of the ACM, , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 32
    • 0009273059 scopus 로고    scopus 로고
    • A Concrete Introduction to Higher Algebra.
    • Springer, 2nd edition,
    • L.N. Childs. A Concrete Introduction to Higher Algebra. Undergraduate Texts in Mathematics. Springer, 2nd edition, 2000.
    • (2000) Undergraduate Texts in Mathematics.
    • Childs, L.N.1
  • 34
    • 0028428941 scopus 로고
    • The Data Encryption Standard (DES) and its strength against attacks.
    • Available for download from
    • D. Coppersmith. The Data Encryption Standard (DES) and its strength against attacks. IBM Journal of Research and De-velopment, 38(3):243-250, 1994. Available for download from http://researchweb.watson.ibm.com/journal/rd/.
    • (1994) IBM Journal of Research and De-velopment, , vol.38 , Issue.3 , pp. 243-250
    • Coppersmith, D.1
  • 39
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack.
    • R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack.SIAM Journal on Computing, 33(1):167-226, 2003.
    • (2003) SIAM Journal on Computing, , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 42
    • 33744979306 scopus 로고    scopus 로고
    • Available for download from
    • W. Dai. Crypto++ 5.2.1 benchmarks. Available for download from http://www.cryptopp.com/benchmarks.html.
    • Crypto++ 5.2.1 benchmarks.
    • Dai, W.1
  • 45
    • 0008538346 scopus 로고
    • A further weakness in the common modulus protocol for the RSA cryptoalgorithm.
    • J. DeLaurentis. A further weakness in the common modulus protocol for the RSA cryptoalgorithm. Cryptologia, 8:253-259, 1984.
    • (1984) Cryptologia, , vol.8 , pp. 253-259
    • DeLaurentis, J.1
  • 48
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the NBS data encryption standard.
    • June
    • W. Diffie and M. Hellman. Exhaustive cryptanalysis of the NBS data encryption standard. Computer, pages 74-84, June 1977.
    • (1977) Computer, , pp. 74-84
    • Diffie, W.1    Hellman, M.2
  • 49
    • 84966249438 scopus 로고
    • Asymptotically fast factorization of integers.
    • J.D. Dixon. Asymptotically fast factorization of integers. Mathematics of Computation, 36:255-260, 1981.
    • (1981) Mathematics of Computation, , vol.36 , pp. 255-260
    • Dixon, J.D.1
  • 51
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI:What you're not being told about public key infrastructure.
    • C. Ellison and B. Schneier. Ten risks of PKI:What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
    • (2000) Computer Security Journal, , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 52
    • 85029454400 scopus 로고
    • A construction of a cipher from a single pseudorandom permutation.
    • Springer
    • S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. In ASIACRYPT, volume 739 of Lecture Notes in Computer Science, pages 210-224. Springer, 1993.
    • (1993) In ASIACRYPT, of Lecture Notes in Computer Science, , vol.739 , pp. 210-224
    • Even, S.1    Mansour, Y.2
  • 53
    • 0001820140 scopus 로고
    • Cryptography and computer privacy.
    • H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, 1973.
    • (1973) Scientific American, , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 59
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms.
    • T. El Gamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory, 31(4):469-472, 1985.
    • (1985) IEEE Trans. Info. Theory , vol.31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 62
    • 85122602279 scopus 로고    scopus 로고
    • Efficient signature schemes with tight security reductions to the Diffie-Hellman problems.
    • E.-J. Goh, S. Jarecki, J. Katz, and N.Wang. Efficient signature schemes with tight security reductions to the Diffie-Hellman problems. J. Cryp-tology, to appear.
    • J. Cryp-tology, to appear.
    • Goh, E.-J.1    Jarecki, S.2    Katz, J.3    Wang, N.4
  • 70
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks.
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, 1988.
    • (1988) SIAM J. Computing, , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 73
    • 0023985175 scopus 로고
    • Solving simultaneous modular equations of low degree.
    • J. H°astad. Solving simultaneous modular equations of low degree. SIAM Journal on Computing, 17(2):336-341, 1988.
    • (1988) SIAM Journal on Computing, , vol.17 , Issue.2 , pp. 336-341
    • H°astad, J.1
  • 75
    • 4243189287 scopus 로고    scopus 로고
    • The security of all RSA and discrete log bits.
    • J. H°astad and M. Näslund. The security of all RSA and discrete log bits. Journal of the ACM, 51(2):187-230, 2004.
    • (2004) Journal of the ACM, , vol.51 , Issue.2 , pp. 187-230
    • H°astad, J.1    Näslund, M.2
  • 77
    • 85007308145 scopus 로고    scopus 로고
    • A tutorial on linear and differential cryptanalysis.
    • H. Heys. A tutorial on linear and differential cryptanalysis. Cryptologia, 26(3):189-221, 2002.
    • (2002) Cryptologia, , vol.26 , Issue.3 , pp. 189-221
    • Heys, H.1
  • 81
    • 0003932974 scopus 로고    scopus 로고
    • The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.
    • D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner, 1996.
    • (1996) Scribner,
    • Kahn, D.1
  • 82
    • 21144456296 scopus 로고    scopus 로고
    • Generating random factored numbers, easily.
    • A. Kalai. Generating random factored numbers, easily. Journal of Cryptology, 16(4):287-289, 2003.
    • (2003) Journal of Cryptology, , vol.16 , Issue.4 , pp. 287-289
    • Kalai, A.1
  • 84
    • 40249089344 scopus 로고    scopus 로고
    • On constructing universal one-way hash functions from arbitrary one-way functions.
    • Available at
    • J. Katz and C.-Y. Koo. On constructing universal one-way hash functions from arbitrary one-way functions. J. Cryptology, to appear. Available at http://eprint.iacr.org/2005/328.
    • J. Cryptology, to appear.
    • Katz, J.1    Koo, C.-Y.2
  • 86
    • 29644436249 scopus 로고    scopus 로고
    • Characterization of security notions for probabilistic private-key encryption.
    • J. Katz and M. Yung. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology, 19(1):67-96, 2006.
    • (2006) Journal of Cryptology, , vol.19 , Issue.1 , pp. 67-96
    • Katz, J.1    Yung, M.2
  • 87
    • 0004216472 scopus 로고    scopus 로고
    • Network Security: Private Communication in a Public World.
    • Prentice Hall, 2nd edition,
    • C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World. Prentice Hall, 2nd edition, 2002.
    • (2002)
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 88
    • 0037614498 scopus 로고    scopus 로고
    • How to protect DES against exhaustive key search (an analysis of DESX).
    • J. Kilian and P. Rogaway. How to protect DES against exhaustive key search (an analysis of DESX). Journal of Cryptology, 14(1):17-35, 2001.
    • (2001) Journal of Cryptology, , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 90
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communication (or: How secure is SSL?).
    • Springer,
    • H. Krawczyk. The order of encryption and authentication for protecting communication (or: How secure is SSL?). In Advances in Cryptology -Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 310-331. Springer, 2001.
    • (2001) In Advances in Cryptology -Crypto 2001, of Lecture Notes in Computer Science, , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 91
    • 85122602230 scopus 로고    scopus 로고
    • Available for download from:
    • H. Kugel. America's code breaker. Available for download from: http://militaryhistory.about.com/.
    • America's code breaker.
    • Kugel, H.1
  • 92
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one-way function.
    • SRI International,
    • L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, 1978.
    • (1978) Technical Report CSL-98,
    • Lamport, L.1
  • 94
  • 97
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandomfunctions.
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandomfunctions. SIAM Journal on Computing, 17(2):373-386, 1988.
    • (1988) SIAM Journal on Computing, , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 103
    • 0019587141 scopus 로고
    • On the security of multiple encryption.
    • R. Merkle and M. Hellman. On the security of multiple encryption. Communications of the ACM, 24(7):465-467, 1981.
    • (1981) Communications of the ACM, , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.1    Hellman, M.2
  • 104
    • 0023985474 scopus 로고
    • The notion of security for probabilistic cryptosystems.
    • S. Micali, C. Rackoff, and B. Sloan. The notion of security for probabilistic cryptosystems. SIAM J. Computing, 17(2):412-426, 1988.
    • (1988) SIAM J. Computing, , vol.17 , Issue.2 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 105
    • 0017217375 scopus 로고
    • Riemann's hypothesis and tests for primality.
    • G.L. Miller. Riemann's hypothesis and tests for primality. Journal of Computer and System Sciences, 13(3):300-317, 1976.
    • (1976) Journal of Computer and System Sciences, , vol.13 , Issue.3 , pp. 300-317
    • Miller, G.L.1
  • 108
    • 0004246335 scopus 로고
    • Federal Information Processing Standard (FIPS), publication 81
    • National Bureau of Standards. DES modes of operation, 1980. Federal Information Processing Standard (FIPS), publication 81.
    • (1980) DES modes of operation,
  • 109
    • 0003508568 scopus 로고
    • Federal Information Processing Standard (FIPS), publication 46
    • National Bureau of Standards. Data encryption standard (DES), 1977. Federal Information Processing Standard (FIPS), publication 46.
    • (1977) Data encryption standard (DES),
  • 110
    • 0013091373 scopus 로고    scopus 로고
    • Federal Information Processing Standard (FIPS), publication 198
    • National Institute of Standards and Technology. The keyed-hash message authentication code (HMAC), 2002. Federal Information Processing Standard (FIPS), publication 198.
    • (2002) The keyed-hash message authentication code (HMAC),
  • 111
    • 0010227312 scopus 로고
    • Complexity of a determinate algorithm for the discrete logarithm.
    • V.I. Nechaev. Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes, 55(2):165-172, 1994.
    • (1994) Mathematical Notes , vol.55 , Issue.2 , pp. 165-172
    • Nechaev, V.I.1
  • 112
    • 0001534053 scopus 로고    scopus 로고
    • Discrete logarithms: The past and the future.
    • A.M. Odlyzko. Discrete logarithms: The past and the future. Designs, Codes, and Cryptography, 19(2/3):129-145, 2000.
    • (2000) Design Codes, and Cryptography, , vol.19 , Issue.2-3 , pp. 129-145
    • Odlyzko, A.M.1
  • 114
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance.
    • S. Pohlig and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Information Theory, 24(1):106-110, 1978.
    • (1978) IEEE Trans. Information Theory, , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 115
    • 84976113380 scopus 로고
    • Theorems of factorization and primality testing.
    • J.M. Pollard. Theorems of factorization and primality testing. Proc. Cambridge Philosophical Society, 76:521-528, 1974.
    • (1974) Proc. Cambridge Philosophical Society, , vol.76 , pp. 521-528
    • Pollard, J.M.1
  • 116
    • 0001637933 scopus 로고
    • A Monte Carlo method for factorization.
    • J.M. Pollard. A Monte Carlo method for factorization. BIT Numerical Mathematics, 15(3):331-334, 1975.
    • (1975) BIT Numerical Mathematics, , vol.15 , Issue.3 , pp. 331-334
    • Pollard, J.M.1
  • 118
    • 0010277907 scopus 로고
    • Digitalized signatures.
    • In R.A. Demillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, editors, Academic Press,
    • M.O. Rabin. Digitalized signatures. In R.A. Demillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, editors, Foundations of Security Computation, pages 155-168. Academic Press, 1978.
    • (1978) Foundations of Security Computation, , pp. 155-168
    • Rabin, M.O.1
  • 120
    • 33845432604 scopus 로고
    • Probabilistic algorithm for testing primality.
    • M.O. Rabin. Probabilistic algorithm for testing primality. Journal of Number Theory, 12(1):128-138, 1980.
    • (1980) Journal of Number Theory, , vol.12 , Issue.1 , pp. 128-138
    • Rabin, M.O.1
  • 122
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems.
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM, , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 123
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance.
    • Springer,
    • P. Rogaway and T. Shrimpton. Cryptographic hash function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 371-388. Springer, 2004.
    • (2004) In Fast Software Encryption - FSE 2004, of Lecture Notes in Computer Science, , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 126
    • 0000211152 scopus 로고
    • Class number, a theory of factorization, and genera.
    • D. Shanks. Class number, a theory of factorization, and genera. In Proc. Symposia in Pure Mathematics 20, pages 415-440, 1971.
    • (1971) In Proc. Symposia in Pure Mathematics 20, , pp. 415-440
    • Shanks, D.1
  • 127
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems.
    • C.E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4):656-715, 1949.
    • (1949) Bell Systems Technical Journal, , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 129
    • 85122602784 scopus 로고    scopus 로고
    • Why chosen ciphertext security matters.
    • IBM Zurich, November Available at
    • V. Shoup. Why chosen ciphertext security matters. Technical Report RZ 3076, IBM Zurich, November 1998. Available at http://shoup.net/papers/expo.pdf.
    • (1998) Technical Report RZ 3076,
    • Shoup, V.1
  • 133
    • 0343349510 scopus 로고
    • A 'weak' privacy protocol using the RSA crypto algorithm.
    • G. Simmons. A 'weak' privacy protocol using the RSA crypto algorithm. Cryptologia, 7:180-182, 1983.
    • (1983) Cryptologia, , vol.7 , pp. 180-182
    • Simmons, G.1
  • 135
  • 136
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes.
    • D.R. Stinson. Universal hashing and authentication codes. Designs, Codes, and Cryptography, 4(4):369-380, 1994.
    • (1994) Designs, Codes, and Cryptography, , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.R.1
  • 140
    • 84960561455 scopus 로고
    • On computable numbers, with an application to the entscheidungsproblem.
    • A. Turing. On computable numbers, with an application to the entscheidungsproblem. Proceedings of the London Mathematical Soci-ety, 2(42):230-265, 1936.
    • (1936) Proceedings of the London Mathematical Soci-ety, , vol.2 , Issue.42 , pp. 230-265
    • Turing, A.1
  • 141
    • 0000478762 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications.
    • G.S. Vernam. Cipher printing telegraph systems for secret wire and radio telegraphic communications. Journal of the American Institute for Electrical Engineers, 55:109-115, 1926.
    • (1926) Journal of the American Institute for Electrical Engineers, , vol.55 , pp. 109-115
    • Vernam, G.S.1
  • 146
    • 84942453819 scopus 로고    scopus 로고
    • NSA Historical Publications. Available at:under Historical Publications
    • P. Weadon. The battle of Midway: AF is short of water, 2000. NSA Historical Publications. Available at: http://www.nsa.gov under Historical Publications.
    • (2000) The battle of Midway: AF is short of water,
    • Weadon, P.1
  • 148
    • 85122601876 scopus 로고
    • American national standard for financial institution message authentication (wholesale),
    • ANSI X9.9. American national standard for financial institution message authentication (wholesale), 1981.
    • (1981)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.