Practice-Oriented Provable-Security (1997)

Cached

Download Links

by Mihir Bellare
Venue:in First International Workshop on Information Security(ISW97
Citations:38 - 0 self

Active Bibliography

17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
7 On the Role of Definitions in and Beyond Cryptography – Phillip Rogaway - 2004
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
17 Building PRFs from PRPs – Chris Hall, David Wagner, John Kelsey, Bruce Schneier - 1998
unknown title – unknown authors
67 Authenticated Diffie-Hellman Key Agreement Protocols – Simon Blake-Wilson, Alfred Menezes - 1998
5 Luby-Racko backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz - 1998
22 Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz, Phillip Rogaway - 1998
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
10 New paradigms for constructing symmetric encryption schemes secure against chosen ciphertext attack – Anand Desai - 2000
447 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
333 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – Martín Abadi, Phillip Rogaway - 2000
Instantiating Random Oracles via UCEs – Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi - 2013
75 Session-Key Generation using Human Passwords Only – Oded Goldreich, Yehuda Lindell - 2001
243 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998
136 Key Agreement Protocols and their Security Analysis – Simon Blake-Wilson , Don Johnson, Alfred Menezes - 1997
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract of ISAAC'96) – Kouichi Sakurai, Yuliang Zheng