Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
暂无分享,去创建一个
Hugo Krawczyk | Tal Rabin | Yevgeniy Dodis | Johan Håstad | Rosario Gennaro | T. Rabin | H. Krawczyk | J. Håstad | Yevgeniy Dodis | R. Gennaro | Y. Dodis
[1] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[2] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[3] Johan Hstad,et al. Construction of a pseudo-random generator from any one-way function , 1989 .
[4] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[5] Douglas R Stinson. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[6] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[7] Hugo Krawczyk,et al. Pseudorandom functions revisited: the cascade construction and its concrete security , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[8] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[9] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[10] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[11] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[12] Ronen Shaltiel,et al. Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.
[13] Ronen Shaltiel,et al. True Random Number Generators Secure in a Changing Environment , 2003, CHES.
[14] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[15] Hugo Krawczyk,et al. Secure Hashed Diffie-Hellman over Non-DDH Groups , 2004, EUROCRYPT.