The order of encryption and authentication for protecting communications (or: how Secure is SSL?) (2001)

by Hugo Krawczyk
Citations:123 - 5 self

Active Bibliography

222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
16 Does Encryption with Redundancy Provide Authenticity? – Jee Hea An, Mihir Bellare - 2001
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
10 New paradigms for constructing symmetric encryption schemes secure against chosen ciphertext attack – Anand Desai - 2000
35 Relaxing chosen-ciphertext security – Ran Canetti, Hugo Krawczyk, Jesper B. Nielsen - 2003
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
261 Analysis of key-exchange protocols and their use for building secure channels – Ran Canetti, Hugo Krawczyk - 2001
2 Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization – Chanathip Namprempre - 2002
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
56 Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization – Mihir Bellare, Amit Sahai - 1999
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
1 Proposal to NIST for a block-cipher mode of operation which simultaneously provides privacy and authenticity – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
3 Simulation-Sound Non-Interactive Zero Knowledge – Amit Sahai - 2001
138 On the security of joint signature and encryption – Jee Hea An, Yevgeniy Dodis, Tal Rabin - 2002
62 Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography – Mihir Bellare, Phillip Rogaway
Submission to IEEE P1363a. DHAES: An Encryption Scheme Based on the Di e-Hellman Problem – Michel Abdalla, Mihir Bellare Y, Phillip Rogaway Z - 1998
31 Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption – John Black, Hector Urtubia - 2002
19 About the security of ciphers (semantic security and pseudo-random permutations) – Duong Hieu Phan, David Pointcheval - 2004