The order of encryption and authentication for protecting communications (or: how Secure is SSL?) (2001)

by Hugo Krawczyk
Citations:123 - 5 self

Documents Related by Co-Citation

222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
106 Parallelizable Encryption Mode with Almost Free Message Integrity – Charanjit Jutla - 2000
447 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
261 Analysis of key-exchange protocols and their use for building secure channels – Ran Canetti, Hugo Krawczyk - 2001
62 Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography – Mihir Bellare, Phillip Rogaway
338 Noninteractive Zero-knowledge Proof of Knowledge and Chosen Ciphertext Attack – C Rackoff, D R Simon - 1991
447 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
138 On the security of joint signature and encryption – Jee Hea An, Yevgeniy Dodis, Tal Rabin - 2002
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
59 Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes – Virgil D. Gligor, Pompiliu Donescu - 2001
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
16 Does Encryption with Redundancy Provide Authenticity? – Jee Hea An, Mihir Bellare - 2001
460 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
37 Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation – Jonathan Katz, Moti Yung - 1978
9 Foundations of Cryptography: Basic – O Goldreich - 2001