Hedged Public-Key Encryption: How to Protect against Bad Randomness
暂无分享,去创建一个
Hovav Shacham | Moni Naor | Mihir Bellare | Zvika Brakerski | Thomas Ristenpart | Gil Segev | Scott Yilek | M. Naor | M. Bellare | Zvika Brakerski | H. Shacham | T. Ristenpart | Scott Yilek | G. Segev
[1] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[2] David Zuckerman. Simulating BPP using a general weak random source , 2005, Algorithmica.
[3] Don Coppersmith,et al. Finding a Small Root of a Univariate Modular Equation , 1996, EUROCRYPT.
[4] Thomas Shrimpton,et al. Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem , 2006, IACR Cryptol. ePrint Arch..
[5] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[6] Victor Shoup,et al. Using Hash Functions as a Hedge against Chosen Ciphertext Attack , 2000, EUROCRYPT.
[7] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[8] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[9] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[10] Gil Segev,et al. Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption , 2008, IACR Cryptol. ePrint Arch..
[11] Kai-Min Chung,et al. Tight Bounds for Hashing Block Sources , 2008, APPROX-RANDOM.
[12] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[13] Dahlia Malkhi,et al. Hold Your Sessions: An Attack on Java Session-Id Generation , 2005, CT-RSA.
[14] Yevgeniy Dodis,et al. Does Privacy Require True Randomness? , 2007, TCC.
[15] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[16] Tatsuaki Okamoto,et al. How to Enhance the Security of Public-Key Encryption at Minimum Cost , 1999, Public Key Cryptography.
[17] Mihir Bellare,et al. Key-Privacy in Public-Key Encryption , 2001, ASIACRYPT.
[18] Jacques Stern,et al. Extended Notions of Security for Multicast Public Key Cryptosystems , 2000, ICALP.
[19] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[20] V. Rich. Personal communication , 1989, Nature.
[21] Benny Pinkas,et al. Analysis of the Linux random number generator , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[22] Jonathan Katz,et al. How to Encrypt with a Malicious Random Number Generator , 2008, FSE.
[23] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.
[24] Benny Pinkas,et al. Cryptanalysis of the windows random number generator , 2007, CCS '07.
[25] Daniel R. L. Brown. A Weak-Randomizer Attack on RSA-OAEP with e = 3 , 2005, IACR Cryptol. ePrint Arch..
[26] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[27] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[28] Mihir Bellare,et al. Code-Based Game-Playing Proofs and the Security of Triple Encryption , 2004, IACR Cryptol. ePrint Arch..
[29] Dan Boneh,et al. Simplified OAEP for the RSA and Rabin Functions , 2001, CRYPTO.
[30] Yevgeniy Dodis,et al. Entropic Security and the Encryption of High Entropy Messages , 2005, TCC.
[31] Amit Sahai,et al. On the (im)possibility of cryptography with imperfect randomness , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[32] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[33] Adam O'Neill,et al. Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles , 2008, CRYPTO.
[34] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[35] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[36] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[37] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[38] Serge Vaudenay,et al. Smashing SQUASH-0 , 2009, EUROCRYPT.
[39] Benny Pinkas,et al. On the Impossibility of Private Key Cryptography with Weakly Random Keys , 1990, CRYPTO.
[40] Hovav Shacham,et al. When private keys are public: results from the 2008 Debian OpenSSL vulnerability , 2009, IMC '09.
[41] Nick Howgrave-Graham,et al. Finding Small Roots of Univariate Modular Equations Revisited , 1997, IMACC.