The Security of Cipher Block Chaining (1994)

Cached

Download Links

by M. Bellare , J. Kilian , P. Rogaway
Citations:144 - 26 self

Active Bibliography

17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
1 A New Suggestion for How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1994
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
204 Optimal Asymmetric Encryption – How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1995
149 Number-theoretic constructions of efficient pseudo-random functions – Moni Naor, Omer Reingold - 1997
unknown title – unknown authors
33 Finding collisions in interactive protocols – A tight lower bound on the round complexity of statistically-hiding commitments – Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev - 2007
1 Cryptography in Constant Parallel Time – Benny Applebaum - 2007
61 Lower bounds on the Efficiency of Generic Cryptographic Constructions – Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan - 2000
Instantiating Random Oracles via UCEs – Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi - 2013
28 Efficient construction of (distributed) verifiable random functions – Yevgeniy Dodis - 2003
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
74 Incremental Cryptography: The Case of Hashing and Signing – Mihir Bellare, Oded Goldreich, Shafi Goldwasser - 1994
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
11 Introduction to Modern Cryptography – Mihir Bellare, Phillip Rogaway - 2005
33 Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques – Simon Blake-Wilson, Alfred Menezes - 1997