Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs


Download Links

by Adam Young , Moti Yung
Venue:Fast Software Encryption 1998, Springer LNCS 1372
Citations:1 - 0 self

Active Bibliography

Cryptanalysis-tolerant Commitment and Hashing – Amir Herzberg - 2002
1 Error-tolerant combiners for oblivious primitives – Bartosz Przydatek, Jürg Wullschleger
5 Robuster Combiners for Oblivious Transfer – Remo Meier, Bartosz Przydatek, Jürg Wullschleger
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers – unknown authors
On The Security of Cascaded Ciphers – Abdolrahman Al Jabri
9 Non-trivial black-box combiners for collision-resistant hash-functions don’t exist – Krzysztof Pietrzak - 2007
12 Security Amplification by Composition: The case of Doubly-Iterated, Ideal Ciphers – W. Aiello, M. Bellare, G. Di Crescenzo, R. Venkatesan - 1998
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers – unknown authors
35 Chosen-Ciphertext Security of Multiple Encryption – Yevgeniy Dodis, Jonathan Katz - 2005
3 Tolerant Combiners: Resilient Cryptographic Design – Amir Herzberg - 2002
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
Leakage Resilient Cryptography in Practice – François-xavier St, Olivier Pereira, Yu Yu, Jean-jacques Quisquater, Moti Yung, Elisabeth Oswald
2 Provable Security for Physical Cryptography – Krzysztof Pietrzak - 2010
TeleDisk User’s Guide, version 4.3a based on TrueCrypt User’s Guide, version 4.3a. – Copyright Markus, Friedl All
Enhancing the Strength of Conventional Cryptosystems – Ivan B. Damgård, Ivan B. Damg Ard, Lars Ramkilde Knudsen, Ivan B. Damgard (brics - 1994
Min-Entropy as a Resource – Barbara Espinoza, Geoffrey Smith
7 The Main-in-the-Middle Defence – Ross Anderson, Mike Bond
3 On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? – Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai - 2003
2 The Role of Information Theory in Cryptography – Ueli M. Maurer - 1993