Concealment and Its Applications to Authenticated Encryption
暂无分享,去创建一个
[1] Daniel J. Bernstein,et al. The Poly1305-AES Message-Authentication Code , 2005, FSE.
[2] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[3] Phillip Rogaway,et al. Authenticated-encryption with associated-data , 2002, CCS '02.
[4] Chanathip Namprempre,et al. Authenticated encryption in SSH: provably fixing the SSH binary packet protocol , 2002, CCS '02.
[5] Antoine Joux,et al. Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC , 2002, CRYPTO.
[6] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[7] Chanathip Namprempre,et al. Provably Fixing the SSH Binary Packet Protocol , 2002 .
[8] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[9] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[10] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[11] Mihir Bellare,et al. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography , 2000, ASIACRYPT.
[12] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[13] Victor Shoup,et al. A Composition Theorem for Universal One-Way Hash Functions , 2000, EUROCRYPT.
[14] Jonathan Katz,et al. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation , 2000, FSE.
[15] Mihir Bellare,et al. Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions , 1999, CRYPTO.
[16] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[17] Markus Jakobsson,et al. Scramble All, Encrypt Small , 1999, FSE.
[18] Stefan Lucks. Accelerated Remotely Keyed Encruption , 1999, FSE.
[19] Joan Feigenbaum,et al. A formal treatment of remotely keyed encryption , 1998, SODA '99.
[20] Daniel R. Simon,et al. Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? , 1998, EUROCRYPT.
[21] Mihir Bellare,et al. Collision-Resistant Hashing: Towards Making UOWHFs Practical , 1997, CRYPTO.
[22] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[23] Stefan Lucks. On the Security of Remotely Keyed Encryption , 1997, FSE.
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[26] Matt Blaze,et al. High-Bandwidth Encryption with Low-Bandwidth Smartcards , 1996, FSE.
[27] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[28] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[29] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[30] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[31] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[32] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[33] Ivan Damgård,et al. Collision Free Hash Functions and Public Key Signature Schemes , 1987, EUROCRYPT.