-
1
-
-
12444337118
-
-
Addison Wesley, 2nd edition,
-
C. Adams and S. Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison Wesley, 2nd edition, 2002.
-
(2002)
Understanding PKI: Concepts, Standards, and Deployment Considerations.
-
-
Adams, C.1
Lloyd, S.2
-
2
-
-
15944367466
-
PRIMES is in P.
-
M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Annals of Mathematics, 160(2):781-793, 2004.
-
(2004)
Annals of Mathematics,
, vol.160
, Issue.2
, pp. 781-793
-
-
Agrawal, M.1
Kayal, N.2
Saxena, N.3
-
3
-
-
84957613967
-
Security amplification by composition: The case of doubly-iterated, ideal ciphers.
-
Springer,
-
W. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan. Security amplification by composition: The case of doubly-iterated, ideal ciphers. In Advances in Cryptology - Crypto '98, volume 1462 of Lecture Notes in Computer Science, pages 390-407. Springer, 1998.
-
(1998)
In Advances in Cryptology - Crypto '98, of Lecture Notes in Computer Science,
, vol.1462
, pp. 390-407
-
-
Aiello, W.1
Bellare, M.2
Di Crescenzo, G.3
Venkatesan, R.4
-
4
-
-
33746330387
-
Proving hard-core predicates using list decoding.
-
IEEE,
-
A.Akavia, S. Goldwasser, and S. Safra. Proving hard-core predicates using list decoding. In Proc. 44th Annual Symposium on Foundations of Computer Science, pages 146-157. IEEE, 2003.
-
(2003)
In Proc. 44th Annual Symposium on Foundations of Computer Science,
, pp. 146-157
-
-
Akavia, A.1
Goldwasser, S.2
Safra, S.3
-
5
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole.
-
W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr. RSA and Rabin functions: Certain parts are as hard as the whole. SIAM Journal on Computing, 17(2):194-209, 1988.
-
(1988)
SIAM Journal on Computing,
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
6
-
-
84947237328
-
On the security of joint signature and encryption.
-
Springer,
-
J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Advances in Cryptology - Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer, 2002.
-
(2002)
In Advances in Cryptology - Eurocrypt 2002, of Lecture Notes in Computer Science,
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
7
-
-
15544367850
-
-
Online link can be found at
-
P. Barreto. The hashing function lounge. Online link can be found at http://paginas.terra.com.br/informatica/paulobarreto.
-
The hashing function lounge.
-
-
Barreto, P.1
-
8
-
-
35048891868
-
Keying hash functions for message authentication.
-
Springer,
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology - Crypto '96, volume 1109 of Lecture Notes in Computer Science, pages 1-15. Springer, 1996.
-
(1996)
In Advances in Cryptology - Crypto '96, of Lecture Notes in Computer Science,
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
9
-
-
0031351741
-
A concrete security treatment of symmetric encryption.
-
IEEE,
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proc. 38th Annual Symposium on Foundations of Computer Science, pages 394-403. IEEE, 1997.
-
(1997)
In Proc. 38th Annual Symposium on Foundations of Computer Science,
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
10
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes.
-
Springer,
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology - Crypto '98, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer, 1998.
-
(1998)
In Advances in Cryptology - Crypto '98, of Lecture Notes in Computer Science,
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
11
-
-
38149125785
-
The power of verification queries in message authentication and authenticated encryption.
-
Available at
-
M. Bellare, O. Goldreich, and A. Mityagin. The power of verification queries in message authentication and authenticated encryption. Available at http://eprint.iacr.org/2004/309.
-
-
-
Bellare, M.1
Goldreich, O.2
Mityagin, A.3
-
12
-
-
85032128552
-
The security of the cipher block chaining message authentication code.
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, 2000.
-
(2000)
Journal of Computer and System Sciences,
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
13
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm.
-
Springer,
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Ad- vances in Cryptology - Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer, 2000.
-
(2000)
In Ad- vances in Cryptology - Asiacrypt 2000, of Lecture Notes in Computer Science,
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
15
-
-
84948986458
-
Optimal asymmetric encryption.
-
Springer,
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Ad-vances in Cryptology - Eurocrypt '94, volume 950 of Lecture Notes in Computer Science, pages 92-111. Springer, 1995.
-
(1995)
In Ad-vances in Cryptology - Eurocrypt '94, of Lecture Notes in Computer Science,
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
16
-
-
84947906522
-
The exact security of digital signatures- how to sign with RSA and Rabin.
-
Springer,
-
M. Bellare and P. Rogaway. The exact security of digital signatures- how to sign with RSA and Rabin. In Advances in Cryptology -Eurocrypt '96, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer, 1996.
-
(1996)
In Advances in Cryptology -Eurocrypt '96, of Lecture Notes in Computer Science,
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs.
-
Springer,A full version of the paper is available at
-
M. Bellare and P. Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. In Advances in Cryp-tology - Eurocrypt 2006, volume 4004 of Lecture Notes in Computer Science, pages 409-426. Springer, 2006. A full version of the paper is available at http://eprint.iacr.org.
-
(2006)
In Advances in Cryp-tology - Eurocrypt 2006, of Lecture Notes in Computer Science,
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
0026397734
-
Differential cryptanalysis of DES-like cryposystems.
-
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryposystems. Journal of Cryptology, 4(1):3-72, 1991.
-
(1991)
Journal of Cryptology,
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
21
-
-
0003030602
-
Coin flipping by telephone.
-
M. Blum. Coin flipping by telephone. In Proc. IEEE COMPCOM, pages 133-137, 1982.
-
(1982)
In Proc. IEEE COMPCOM,
, pp. 133-137
-
-
Blum, M.1
-
22
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information.
-
Springer,
-
M. Blum and S. Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In Advances in Cryptology - Crypto '84, volume 196 of Lecture Notes in Computer Science, pages 289-302. Springer, 1985.
-
(1985)
In Advances in Cryptology - Crypto '84, of Lecture Notes in Computer Science,
, vol.196
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
23
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits.
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, 1984.
-
(1984)
SIAM Journal on Computing,
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
24
-
-
84947778144
-
The decision Diffie-Hellman problem.
-
Springer,
-
D. Boneh. The decision Diffie-Hellman problem. In Algorithmic Number Theory, 3rd Intl. Symposium, volume 1423 of Lecture Notes in Computer Science, pages 48-63. Springer, 1998.
-
(1998)
In Algorithmic Number Theory, 3rd Intl. Symposium, of Lecture Notes in Computer Science,
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
25
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem.
-
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society, 46(2):203-213, 1999.
-
(1999)
Notices of the American Mathematical Society,
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
27
-
-
84937418785
-
Why textbook ElGamal and RSA encryption are insecure.
-
Springer,
-
D. Boneh, A. Joux, and P. Nguyen. Why textbook ElGamal and RSA encryption are insecure. In Advances in Cryptology - Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 30-44. Springer, 2000.
-
(2000)
In Advances in Cryptology - Asiacrypt 2000, of Lecture Notes in Computer Science,
, vol.1976
, pp. 30-44
-
-
Boneh, D.1
Joux, A.2
Nguyen, P.3
-
28
-
-
84957634529
-
Breaking RSA may not be equivalent to factoring.
-
Springer,
-
D. Boneh and R. Venkatesan. Breaking RSA may not be equivalent to factoring. In Advances in Cryptology - Eurocrypt '98, volume 1403 of Lecture Notes in Computer Science, pages 59-71. Springer, 1998.
-
(1998)
In Advances in Cryptology - Eurocrypt '98, of Lecture Notes in Computer Science,
, vol.1403
, pp. 59-71
-
-
Boneh, D.1
Venkatesan, R.2
-
30
-
-
4243180376
-
The random oracle methodology, revisited.
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. Journal of the ACM, 51(4):557-594, 2004.
-
(2004)
Journal of the ACM,
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
31
-
-
84947955350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer.
-
Springer,
-
D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In Ad-vances in Cryptology - Crypto '91, volume 576 of Lecture Notes in Computer Science, pages 470-484. Springer, 1992.
-
(1992)
In Ad-vances in Cryptology - Crypto '91, of Lecture Notes in Computer Science,
, vol.576
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
32
-
-
0009273059
-
A Concrete Introduction to Higher Algebra.
-
Springer, 2nd edition,
-
L.N. Childs. A Concrete Introduction to Higher Algebra. Undergraduate Texts in Mathematics. Springer, 2nd edition, 2000.
-
(2000)
Undergraduate Texts in Mathematics.
-
-
Childs, L.N.1
-
34
-
-
0028428941
-
The Data Encryption Standard (DES) and its strength against attacks.
-
Available for download from
-
D. Coppersmith. The Data Encryption Standard (DES) and its strength against attacks. IBM Journal of Research and De-velopment, 38(3):243-250, 1994. Available for download from http://researchweb.watson.ibm.com/journal/rd/.
-
(1994)
IBM Journal of Research and De-velopment,
, vol.38
, Issue.3
, pp. 243-250
-
-
Coppersmith, D.1
-
37
-
-
33745119040
-
Merkle-Damg°ard revisited: How to construct a hash function.
-
Springer,
-
J.-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damg°ard revisited: How to construct a hash function. In Advances in Cryptology- Crypto 2005, volume 3621 of Lecture Notes in Computer Science, pages 430-448. Springer, 2005.
-
(2005)
In Advances in Cryptology- Crypto 2005, of Lecture Notes in Computer Science,
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
39
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack.
-
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack.SIAM Journal on Computing, 33(1):167-226, 2003.
-
(2003)
SIAM Journal on Computing,
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
42
-
-
33744979306
-
-
Available for download from
-
W. Dai. Crypto++ 5.2.1 benchmarks. Available for download from http://www.cryptopp.com/benchmarks.html.
-
Crypto++ 5.2.1 benchmarks.
-
-
Dai, W.1
-
45
-
-
0008538346
-
A further weakness in the common modulus protocol for the RSA cryptoalgorithm.
-
J. DeLaurentis. A further weakness in the common modulus protocol for the RSA cryptoalgorithm. Cryptologia, 8:253-259, 1984.
-
(1984)
Cryptologia,
, vol.8
, pp. 253-259
-
-
DeLaurentis, J.1
-
48
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS data encryption standard.
-
June
-
W. Diffie and M. Hellman. Exhaustive cryptanalysis of the NBS data encryption standard. Computer, pages 74-84, June 1977.
-
(1977)
Computer,
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.2
-
49
-
-
84966249438
-
Asymptotically fast factorization of integers.
-
J.D. Dixon. Asymptotically fast factorization of integers. Mathematics of Computation, 36:255-260, 1981.
-
(1981)
Mathematics of Computation,
, vol.36
, pp. 255-260
-
-
Dixon, J.D.1
-
50
-
-
0343337504
-
Non-malleable cryptography.
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal on Computing,
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
51
-
-
0034581037
-
Ten risks of PKI:What you're not being told about public key infrastructure.
-
C. Ellison and B. Schneier. Ten risks of PKI:What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
-
(2000)
Computer Security Journal,
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
52
-
-
85029454400
-
A construction of a cipher from a single pseudorandom permutation.
-
Springer
-
S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. In ASIACRYPT, volume 739 of Lecture Notes in Computer Science, pages 210-224. Springer, 1993.
-
(1993)
In ASIACRYPT, of Lecture Notes in Computer Science,
, vol.739
, pp. 210-224
-
-
Even, S.1
Mansour, Y.2
-
53
-
-
0001820140
-
Cryptography and computer privacy.
-
H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, 1973.
-
(1973)
Scientific American,
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
56
-
-
33748569747
-
Attacks on RC4 and WEP.
-
S. Fluhrer, I. Mantin, and A. Shamir. Attacks on RC4 and WEP. CryptoBytes, 5(2):26-34, 2002.
-
(2002)
CryptoBytes,
, vol.5
, Issue.2
, pp. 26-34
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
57
-
-
33748569747
-
Attacks on RC4 and WEP.
-
J.B. Fluhrer, I. Mantin, and A. Shamir. Attacks on RC4 and WEP. CryptoBytes, 5(2):26-34, 2002.
-
(2002)
CryptoBytes,
, vol.5
, Issue.2
, pp. 26-34
-
-
Fluhrer, J.B.1
Mantin, I.2
Shamir, A.3
-
58
-
-
84880853825
-
RSA-OAEP is secure under the RSA assumption.
-
Springer,
-
E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. RSA-OAEP is secure under the RSA assumption. In Advances in Cryptology -Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 260-274. Springer, 2001.
-
(2001)
In Advances in Cryptology -Crypto 2001, of Lecture Notes in Computer Science,
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
59
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms.
-
T. El Gamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Trans. Info. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
61
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle.
-
Springer,
-
R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology - Eurocrypt '99, volume 1592 of Lecture Notes in Computer Science, pages 123-139. Springer, 1999.
-
(1999)
In Advances in Cryptology - Eurocrypt '99, of Lecture Notes in Computer Science,
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
62
-
-
85122602279
-
Efficient signature schemes with tight security reductions to the Diffie-Hellman problems.
-
E.-J. Goh, S. Jarecki, J. Katz, and N.Wang. Efficient signature schemes with tight security reductions to the Diffie-Hellman problems. J. Cryp-tology, to appear.
-
J. Cryp-tology, to appear.
-
-
Goh, E.-J.1
Jarecki, S.2
Katz, J.3
Wang, N.4
-
66
-
-
85028838274
-
On the cryptographic applications of random functions.
-
Springer,
-
O. Goldreich, S. Goldwasser, and S. Micali. On the cryptographic applications of random functions. In Advances in Cryptology-Crypto'84, volume 196 of Lecture Notes in Computer Science, pages 276-288. Springer, 1985.
-
(1985)
In Advances in Cryptology-Crypto'84, of Lecture Notes in Computer Science,
, vol.196
, pp. 276-288
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
67
-
-
0022793132
-
How to construct random functions.
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, 1986.
-
(1986)
Journal of the ACM,
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
70
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks.
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, 1988.
-
(1988)
SIAM J. Computing,
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
71
-
-
0020877595
-
Strong signature schemes.
-
ACM,
-
S. Goldwasser, S. Micali, and A.C.-C. Yao. Strong signature schemes. In Proc. 15th Annual ACM Symposium on Theory of Computing, pages 431-439. ACM, 1983.
-
(1983)
In Proc. 15th Annual ACM Symposium on Theory of Computing,
, pp. 431-439
-
-
Goldwasser, S.1
Micali, S.2
Yao, A.C.-C.3
-
73
-
-
0023985175
-
Solving simultaneous modular equations of low degree.
-
J. H°astad. Solving simultaneous modular equations of low degree. SIAM Journal on Computing, 17(2):336-341, 1988.
-
(1988)
SIAM Journal on Computing,
, vol.17
, Issue.2
, pp. 336-341
-
-
H°astad, J.1
-
74
-
-
0345253860
-
A pseudorandom generator from any one-way function.
-
J. H°astad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4):1364-1396, 1999.
-
(1999)
SIAM Journal on Computing,
, vol.28
, Issue.4
, pp. 1364-1396
-
-
H°astad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
75
-
-
4243189287
-
The security of all RSA and discrete log bits.
-
J. H°astad and M. Näslund. The security of all RSA and discrete log bits. Journal of the ACM, 51(2):187-230, 2004.
-
(2004)
Journal of the ACM,
, vol.51
, Issue.2
, pp. 187-230
-
-
H°astad, J.1
Näslund, M.2
-
77
-
-
85007308145
-
A tutorial on linear and differential cryptanalysis.
-
H. Heys. A tutorial on linear and differential cryptanalysis. Cryptologia, 26(3):189-221, 2002.
-
(2002)
Cryptologia,
, vol.26
, Issue.3
, pp. 189-221
-
-
Heys, H.1
-
81
-
-
0003932974
-
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.
-
D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner, 1996.
-
(1996)
Scribner,
-
-
Kahn, D.1
-
82
-
-
21144456296
-
Generating random factored numbers, easily.
-
A. Kalai. Generating random factored numbers, easily. Journal of Cryptology, 16(4):287-289, 2003.
-
(2003)
Journal of Cryptology,
, vol.16
, Issue.4
, pp. 287-289
-
-
Kalai, A.1
-
84
-
-
40249089344
-
On constructing universal one-way hash functions from arbitrary one-way functions.
-
Available at
-
J. Katz and C.-Y. Koo. On constructing universal one-way hash functions from arbitrary one-way functions. J. Cryptology, to appear. Available at http://eprint.iacr.org/2005/328.
-
J. Cryptology, to appear.
-
-
Katz, J.1
Koo, C.-Y.2
-
85
-
-
84974720881
-
Unforgeable encryption and chosen-ciphertext secure modes of operation.
-
Springer,
-
J. Katz and M. Yung. Unforgeable encryption and chosen-ciphertext secure modes of operation. In Fast Software Encryption - FSE 2000, volume 1978 of Lecture Notes in Computer Science, pages 284-299. Springer, 2001.
-
(2001)
In Fast Software Encryption - FSE 2000, of Lecture Notes in Computer Science,
, vol.1978
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
86
-
-
29644436249
-
Characterization of security notions for probabilistic private-key encryption.
-
J. Katz and M. Yung. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology, 19(1):67-96, 2006.
-
(2006)
Journal of Cryptology,
, vol.19
, Issue.1
, pp. 67-96
-
-
Katz, J.1
Yung, M.2
-
87
-
-
0004216472
-
Network Security: Private Communication in a Public World.
-
Prentice Hall, 2nd edition,
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World. Prentice Hall, 2nd edition, 2002.
-
(2002)
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
88
-
-
0037614498
-
How to protect DES against exhaustive key search (an analysis of DESX).
-
J. Kilian and P. Rogaway. How to protect DES against exhaustive key search (an analysis of DESX). Journal of Cryptology, 14(1):17-35, 2001.
-
(2001)
Journal of Cryptology,
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
90
-
-
84880901653
-
The order of encryption and authentication for protecting communication (or: How secure is SSL?).
-
Springer,
-
H. Krawczyk. The order of encryption and authentication for protecting communication (or: How secure is SSL?). In Advances in Cryptology -Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 310-331. Springer, 2001.
-
(2001)
In Advances in Cryptology -Crypto 2001, of Lecture Notes in Computer Science,
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
91
-
-
85122602230
-
-
Available for download from:
-
H. Kugel. America's code breaker. Available for download from: http://militaryhistory.about.com/.
-
America's code breaker.
-
-
Kugel, H.1
-
92
-
-
0003605145
-
Constructing digital signatures from a one-way function.
-
SRI International,
-
L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, 1978.
-
(1978)
Technical Report CSL-98,
-
-
Lamport, L.1
-
97
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandomfunctions.
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandomfunctions. SIAM Journal on Computing, 17(2):373-386, 1988.
-
(1988)
SIAM Journal on Computing,
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
103
-
-
0019587141
-
On the security of multiple encryption.
-
R. Merkle and M. Hellman. On the security of multiple encryption. Communications of the ACM, 24(7):465-467, 1981.
-
(1981)
Communications of the ACM,
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.1
Hellman, M.2
-
104
-
-
0023985474
-
The notion of security for probabilistic cryptosystems.
-
S. Micali, C. Rackoff, and B. Sloan. The notion of security for probabilistic cryptosystems. SIAM J. Computing, 17(2):412-426, 1988.
-
(1988)
SIAM J. Computing,
, vol.17
, Issue.2
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
105
-
-
0017217375
-
Riemann's hypothesis and tests for primality.
-
G.L. Miller. Riemann's hypothesis and tests for primality. Journal of Computer and System Sciences, 13(3):300-317, 1976.
-
(1976)
Journal of Computer and System Sciences,
, vol.13
, Issue.3
, pp. 300-317
-
-
Miller, G.L.1
-
108
-
-
0004246335
-
-
Federal Information Processing Standard (FIPS), publication 81
-
National Bureau of Standards. DES modes of operation, 1980. Federal Information Processing Standard (FIPS), publication 81.
-
(1980)
DES modes of operation,
-
-
-
109
-
-
0003508568
-
-
Federal Information Processing Standard (FIPS), publication 46
-
National Bureau of Standards. Data encryption standard (DES), 1977. Federal Information Processing Standard (FIPS), publication 46.
-
(1977)
Data encryption standard (DES),
-
-
-
110
-
-
0013091373
-
-
Federal Information Processing Standard (FIPS), publication 198
-
National Institute of Standards and Technology. The keyed-hash message authentication code (HMAC), 2002. Federal Information Processing Standard (FIPS), publication 198.
-
(2002)
The keyed-hash message authentication code (HMAC),
-
-
-
111
-
-
0010227312
-
Complexity of a determinate algorithm for the discrete logarithm.
-
V.I. Nechaev. Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes, 55(2):165-172, 1994.
-
(1994)
Mathematical Notes
, vol.55
, Issue.2
, pp. 165-172
-
-
Nechaev, V.I.1
-
112
-
-
0001534053
-
Discrete logarithms: The past and the future.
-
A.M. Odlyzko. Discrete logarithms: The past and the future. Designs, Codes, and Cryptography, 19(2/3):129-145, 2000.
-
(2000)
Design Codes, and Cryptography,
, vol.19
, Issue.2-3
, pp. 129-145
-
-
Odlyzko, A.M.1
-
114
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance.
-
S. Pohlig and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Information Theory, 24(1):106-110, 1978.
-
(1978)
IEEE Trans. Information Theory,
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
115
-
-
84976113380
-
Theorems of factorization and primality testing.
-
J.M. Pollard. Theorems of factorization and primality testing. Proc. Cambridge Philosophical Society, 76:521-528, 1974.
-
(1974)
Proc. Cambridge Philosophical Society,
, vol.76
, pp. 521-528
-
-
Pollard, J.M.1
-
116
-
-
0001637933
-
A Monte Carlo method for factorization.
-
J.M. Pollard. A Monte Carlo method for factorization. BIT Numerical Mathematics, 15(3):331-334, 1975.
-
(1975)
BIT Numerical Mathematics,
, vol.15
, Issue.3
, pp. 331-334
-
-
Pollard, J.M.1
-
118
-
-
0010277907
-
Digitalized signatures.
-
In R.A. Demillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, editors, Academic Press,
-
M.O. Rabin. Digitalized signatures. In R.A. Demillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, editors, Foundations of Security Computation, pages 155-168. Academic Press, 1978.
-
(1978)
Foundations of Security Computation,
, pp. 155-168
-
-
Rabin, M.O.1
-
120
-
-
33845432604
-
Probabilistic algorithm for testing primality.
-
M.O. Rabin. Probabilistic algorithm for testing primality. Journal of Number Theory, 12(1):128-138, 1980.
-
(1980)
Journal of Number Theory,
, vol.12
, Issue.1
, pp. 128-138
-
-
Rabin, M.O.1
-
121
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack.
-
Springer,
-
C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology - Crypto '91, volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer, 1992.
-
(1992)
In Advances in Cryptology - Crypto '91, of Lecture Notes in Computer Science,
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
122
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems.
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM,
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
123
-
-
35048855067
-
Cryptographic hash function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance.
-
Springer,
-
P. Rogaway and T. Shrimpton. Cryptographic hash function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 371-388. Springer, 2004.
-
(2004)
In Fast Software Encryption - FSE 2004, of Lecture Notes in Computer Science,
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
126
-
-
0000211152
-
Class number, a theory of factorization, and genera.
-
D. Shanks. Class number, a theory of factorization, and genera. In Proc. Symposia in Pure Mathematics 20, pages 415-440, 1971.
-
(1971)
In Proc. Symposia in Pure Mathematics 20,
, pp. 415-440
-
-
Shanks, D.1
-
127
-
-
84890522850
-
Communication theory of secrecy systems.
-
C.E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4):656-715, 1949.
-
(1949)
Bell Systems Technical Journal,
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
129
-
-
85122602784
-
Why chosen ciphertext security matters.
-
IBM Zurich, November Available at
-
V. Shoup. Why chosen ciphertext security matters. Technical Report RZ 3076, IBM Zurich, November 1998. Available at http://shoup.net/papers/expo.pdf.
-
(1998)
Technical Report RZ 3076,
-
-
Shoup, V.1
-
133
-
-
0343349510
-
A 'weak' privacy protocol using the RSA crypto algorithm.
-
G. Simmons. A 'weak' privacy protocol using the RSA crypto algorithm. Cryptologia, 7:180-182, 1983.
-
(1983)
Cryptologia,
, vol.7
, pp. 180-182
-
-
Simmons, G.1
-
134
-
-
0003038453
-
A survey of information authentication.
-
In G. Simmons, editor, IEEE Press,
-
G. Simmons. A survey of information authentication. In G. Simmons, editor, Contemporary Cryptology: The Science of Information Integrity, pages 379-419. IEEE Press, 1992.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity,
, pp. 379-419
-
-
Simmons, G.1
-
136
-
-
0000410707
-
Universal hashing and authentication codes.
-
D.R. Stinson. Universal hashing and authentication codes. Designs, Codes, and Cryptography, 4(4):369-380, 1994.
-
(1994)
Designs, Codes, and Cryptography,
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.R.1
-
140
-
-
84960561455
-
On computable numbers, with an application to the entscheidungsproblem.
-
A. Turing. On computable numbers, with an application to the entscheidungsproblem. Proceedings of the London Mathematical Soci-ety, 2(42):230-265, 1936.
-
(1936)
Proceedings of the London Mathematical Soci-ety,
, vol.2
, Issue.42
, pp. 230-265
-
-
Turing, A.1
-
141
-
-
0000478762
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications.
-
G.S. Vernam. Cipher printing telegraph systems for secret wire and radio telegraphic communications. Journal of the American Institute for Electrical Engineers, 55:109-115, 1926.
-
(1926)
Journal of the American Institute for Electrical Engineers,
, vol.55
, pp. 109-115
-
-
Vernam, G.S.1
-
143
-
-
33745171465
-
Finding collisions in the full SHA-1.
-
Springer,
-
X. Wang, Y. L. Yin, and H. Yu. Finding collisions in the full SHA-1. In Advances in Cryptology - Crypto 2005, volume 3621 of Lecture Notes in Computer Science, pages 17-36. Springer, 2005.
-
(2005)
In Advances in Cryptology - Crypto 2005, of Lecture Notes in Computer Science,
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
144
-
-
24944591357
-
How to break MD5 and other hash functions.
-
Springer,
-
X. Wang and H. Yu. How to break MD5 and other hash functions. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 19-35. Springer, 2005.
-
(2005)
In Advances in Cryptology - Eurocrypt 2005, of Lecture Notes in Computer Science,
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
146
-
-
84942453819
-
-
NSA Historical Publications. Available at:under Historical Publications
-
P. Weadon. The battle of Midway: AF is short of water, 2000. NSA Historical Publications. Available at: http://www.nsa.gov under Historical Publications.
-
(2000)
The battle of Midway: AF is short of water,
-
-
Weadon, P.1
-
148
-
-
85122601876
-
-
American national standard for financial institution message authentication (wholesale),
-
ANSI X9.9. American national standard for financial institution message authentication (wholesale), 1981.
-
(1981)
-
-
|