On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures
暂无分享,去创建一个
[1] Benny Pinkas,et al. Cryptanalysis of the random number generator of the Windows operating system , 2009, TSEC.
[2] Thomas Ristenpart,et al. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography , 2010, NDSS.
[3] Mihir Bellare,et al. Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.
[4] References , 1971 .
[5] Jean-Sébastien Coron,et al. Optimal Security Proofs for PSS and Other Signature Schemes , 2002, EUROCRYPT.
[6] Jörg Schwenk,et al. Randomly Failed! The State of Randomness in Current Java Implementations , 2013, CT-RSA.
[7] Jacques Stern,et al. RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.
[8] Arjen K. Lenstra,et al. Public Keys , 2012, CRYPTO.
[9] Kenneth G. Paterson,et al. Related Randomness Attacks for Public Key Encryption , 2014, IACR Cryptol. ePrint Arch..
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[12] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[13] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[14] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[15] Tanja Lange,et al. Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..
[16] Tanja Lange,et al. On the Practical Exploitability of Dual EC in TLS Implementations , 2014, USENIX Security Symposium.
[17] V. Shoup,et al. Information technology-Security techniques-Encryption algorithms-Part 2 : Asymmetric Ciphers , 2004 .
[18] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[19] Jean-Sébastien Coron,et al. On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption , 2010, IACR Cryptol. ePrint Arch..
[20] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[21] Hovav Shacham,et al. Hedged Public-Key Encryption: How to Protect against Bad Randomness , 2009, ASIACRYPT.
[22] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[23] Mihir Bellare,et al. Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security , 2007, IEEE Transactions on Information Theory.
[24] Jacob C. N. Schuldt,et al. Multi-recipient encryption, revisited , 2014, AsiaCCS.
[25] Dahlia Malkhi,et al. Hold Your Sessions: An Attack on Java Session-Id Generation , 2005, CT-RSA.
[26] Mihir Bellare,et al. Nonce-Based Cryptography: Retaining Security When Randomness Fails , 2016, EUROCRYPT.
[27] Benny Pinkas,et al. Analysis of the Linux random number generator , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[28] Siu-Ming Yiu,et al. Related Randomness Attacks for Public Key Cryptosystems , 2015, AsiaCCS.
[29] Jonathan Katz,et al. How to Encrypt with a Malicious Random Number Generator , 2008, FSE.
[30] David Pointcheval,et al. Security analysis of pseudo-random number generators with input: /dev/random is not robust , 2013, CCS.
[31] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[32] Ye Zhang,et al. On the Regularity of Lossy RSA - Improved Bounds and Applications to Padding-Based Encryption , 2015, TCC.
[33] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[34] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[35] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.