Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
暂无分享,去创建一个
[1] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[2] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[3] Yehuda Lindell,et al. Resettably-sound zero-knowledge and its applications , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[4] M. B ELLARE,et al. Multi-Recipient Encryption Schemes : Efficient Constructions and their Security , 2007 .
[5] Mihir Bellare,et al. Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security , 2007, IEEE Transactions on Information Theory.
[6] Steven D. Gribble,et al. A safety-oriented platform for Web applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[7] Marc Fischlin,et al. Identification Protocols Secure against Reset Attacks , 2001, EUROCRYPT.
[8] Thomas Ristenpart,et al. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography , 2010, NDSS.
[9] Ran Canetti,et al. Resettable Zero-Knowledge , 1999, IACR Cryptol. ePrint Arch..
[10] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[11] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[12] Amit Sahai,et al. Resettably Secure Computation , 2009, EUROCRYPT.
[13] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[14] Anand Desai,et al. A Practice-Oriented Treatment of Pseudorandom Number Generators , 2002, EUROCRYPT.
[15] Mihir Bellare,et al. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation , 2006, CCS '06.
[16] Ran Canetti,et al. Resettable zero-knowledge (extended abstract) , 2000, STOC '00.
[17] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[18] Thomas Shrimpton,et al. Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem , 2006, IACR Cryptol. ePrint Arch..
[19] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[20] Hovav Shacham,et al. Hedged Public-Key Encryption: How to Protect against Bad Randomness , 2009, ASIACRYPT.
[21] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[22] Mihir Bellare,et al. Code-Based Game-Playing Proofs and the Security of Triple Encryption , 2004, IACR Cryptol. ePrint Arch..
[23] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[24] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[25] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[26] Silvio Micali,et al. Soundness in the Public-Key Model , 2001, CRYPTO.