On the Security of the CCM Encryption Mode and of a Slight Variant
暂无分享,去创建一个
Frédéric Valette | Pierre-Alain Fouque | Sébastien Zimmer | Gwenaëlle Martinet | F. Valette | Pierre-Alain Fouque | G. Martinet | Sébastien Zimmer
[1] Mihir Bellare,et al. A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion , 1999, IACR Cryptol. ePrint Arch..
[2] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[3] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[4] David A. Wagner,et al. A Critique of CCM , 2003, IACR Cryptol. ePrint Arch..
[5] Stefan Lucks,et al. The Sum of PRPs Is a Secure PRF , 2000, EUROCRYPT.
[6] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[7] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[8] Morris Dworkin,et al. Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .
[9] Mihir Bellare,et al. Improved Security Analyses for CBC MACs , 2005, CRYPTO.
[10] Bruce Schneier,et al. Building PRFs from PRPs , 1998, CRYPTO.
[11] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[12] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[13] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[14] Jakob Jonsson,et al. On the Security of CTR + CBC-MAC , 2002, Selected Areas in Cryptography.
[15] Mihir Bellare,et al. The Power of Verification Queries in Message Authentication and Authenticated Encryption , 2004, IACR Cryptol. ePrint Arch..
[16] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[17] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[18] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[19] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[20] Jonathan Katz,et al. Characterization of Security Notions for Probabilistic Private-Key Encryption , 2005, Journal of Cryptology.
[21] Hugo Krawczyk,et al. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.
[22] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[23] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[24] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[25] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[26] Mihir Bellare,et al. The EAX Mode of Operation , 2004, FSE.
[27] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .
[28] Morris J. Dworkin. SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .
[29] Charanjit S. Jutla,et al. Encryption Modes with Almost Free Message Integrity , 2001, Journal of Cryptology.
[30] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.