A concrete security treatment of symmetric encryption
暂无分享,去创建一个
Mihir Bellare | Phillip Rogaway | Anand Desai | E. Jokipii | M. Bellare | P. Rogaway | Anand Desai | E. Jokipii
[1] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[2] Amir Herzberg,et al. Pubic Randomness in Cryptography , 1992, CRYPTO.
[3] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[4] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[5] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[6] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[7] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[8] Silvio Micali,et al. The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.
[9] Oded Goldreich,et al. RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..
[10] GoldreichOded. A uniform-complexity treatment of encryption and zero-knowledge , 1993 .
[11] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[12] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[13] Hugo Krawczyk,et al. Pseudorandom functions revisited: the cascade construction and its concrete security , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[14] Leonid A. Levin,et al. Security preserving amplification of hardness , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.