Folklore, practice and theory of robust combiners
暂无分享,去创建一个
[1] Jonathan Katz,et al. Characterization of Security Notions for Probabilistic Private-Key Encryption , 2005, Journal of Cryptology.
[2] Ivan Damgård,et al. Enhancing the Strength of Conventional Cryptosystems , 1994 .
[3] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[4] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[5] Bart Preneel,et al. Cryptographic hash functions , 2010, Eur. Trans. Telecommun..
[6] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[7] G. Blakley,et al. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems , 1981 .
[8] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[9] Amir Herzberg,et al. Pubic Randomness in Cryptography , 1992, CRYPTO.
[10] Ivan Damgård,et al. Two-Key Triple Encryption , 1998, Journal of Cryptology.
[11] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[12] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[13] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[14] Oded Goldreich,et al. Foundations of Cryptography - A Primer , 2005, Found. Trends Theor. Comput. Sci..
[15] Dan Boneh,et al. On the Impossibility of Efficiently Combining Collision Resistant Hash Functions , 2006, CRYPTO.
[16] Marc Fischlin,et al. Multi-property Preserving Combiners for Hash Functions , 2008, TCC.
[17] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[18] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[19] Jonathan Katz,et al. Chosen-Ciphertext Security of Multiple Encryption , 2005, TCC.
[20] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] Oded Goldreich,et al. On the power of cascade ciphers , 1985, TOCS.
[23] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[24] Moni Naor,et al. On Robust Combiners for Oblivious Transfer and Other Primitives , 2005, EUROCRYPT.
[25] Krzysztof Pietrzak,et al. Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist , 2007, EUROCRYPT.
[26] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[27] Bartosz Przydatek,et al. On Robust Combiners for Private Information Retrieval and Other Primitives , 2006, CRYPTO.
[28] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[29] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[30] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[31] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[32] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[33] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[34] Junji Shikata,et al. On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? , 2004, Public Key Cryptography.
[35] Victor Shoup,et al. Using Hash Functions as a Hedge against Chosen Ciphertext Attack , 2000, EUROCRYPT.
[36] Jürg Wullschleger,et al. Robuster Combiners for Oblivious Transfer , 2007, TCC.
[37] Silvio Micali,et al. How to sign given any trapdoor permutation , 1992, JACM.
[38] Giovanni Di Crescenzo,et al. Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers , 1998, CRYPTO.
[39] Ueli Maurer,et al. Cascade ciphers: The importance of being first , 1993, Journal of Cryptology.
[40] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[41] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..