The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
暂无分享,去创建一个
[1] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[2] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[3] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[4] Mihir Bellare,et al. OCB Mode , 2001, IACR Cryptol. ePrint Arch..
[5] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[6] Jonathan Katz,et al. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation , 2000, FSE.
[7] Phillip Rogaway,et al. Bucket Hashing and Its Application to Fast Message Authentication , 1995, Journal of Cryptology.
[8] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[9] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[10] Mihir Bellare,et al. A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation , 1997, FOCS 1997.
[11] Tatu Ylonen,et al. SSH Transport Layer Protocol , 1996 .
[12] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[13] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[14] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[15] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[16] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[17] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[18] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[19] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[20] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[21] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[22] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[23] Mihir Bellare,et al. Does Encryption with Redundancy Provide Authenticity? , 2001, EUROCRYPT.
[24] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[25] Jonathan Katz,et al. Complete characterization of security notions for probabilistic private-key encryption , 2000, STOC '00.
[26] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[27] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.