Cryptography Reference
In-Depth Information
[13] Bellare, Mihir: New Proofs for NMAC and HMAC: Security without Collision-
Resistance . In: Dwork, Cynthia (Herausgeber): Advances in Cryptology - CRYPTO
2006, 26th Annual International Cryptology Conference, Proceedings ,Band4117der
Reihe Lecture Notes in Computer Science , Seiten 602-619. Springer, 2006.
[14] Bellare, Mihir, Alexandra Boldyreva und Adriana Palacio: An Uninstantiable Random-
Oracle-Model Scheme for a Hybrid-Encryption Problem . In: Cachin, Christian und Jan
Camenisch (Herausgeber): Advances in Cryptology - EUROCRYPT 2004, International
Conference on the Theory and Applications of Cryptographic Techniques, Proceedings ,
Band 3027 der Reihe Lecture Notes in Computer Science , Seiten 171-188. Springer,
2004.
[15] Bellare, Mihir, Ran Canetti und Hugo Krawczyk: Keying Hash Functions for Message
Authentication . In: Koblitz, Neal (Herausgeber): Advances in Cryptology - CRYPTO
'96, 16th Annual International Cryptology Conference, Proceedings ,Band1109der
Reihe Lecture Notes in Computer Science , Seiten 1-15. Springer, 1996.
[16] Bellare, Mihir, Anand Desai, Eron Jokipii und Phillip Rogaway: A Concrete Security
Treatment of Symmetric Encryption .In: Proceedings of the 38th Annual Symposium
on Foundations of Computer Science (FOCS 1997) , Seiten 394-403. IEEE Computer
Society, 1997.
[17] Bellare, Mihir, Oded Goldreich und Anton Mityagin: The Power of Verification Queries
in Message Authentication and Authenticated Encryption . Cryptology ePrint Archive,
Report 2004/309, 2004. http://eprint.iacr.org/ .
[18] Bellare, Mihir, Roch Guérin und Phillip Rogaway: XOR MACs: New Methods for
Message Authentication Using Finite Pseudorandom Functions . In: Coppersmith, Don
(Herausgeber): Advances in Cryptology - CRYPTO '95, 15th Annual International
Cryptology Conference, Proceedings , Band 963 der Reihe Lecture Notes in Computer
Science , Seiten 15-28. Springer, 1995.
[19] Bellare, Mihir, Dennis Hofheinz und Eike Kiltz: Subtleties in the Definition of
IND-CCA: When and How Should Challenge-Decryption be Disallowed?
Cryptology
ePrint Archive, Report 2009/418, 2009. http://eprint.iacr.org/ .
[20] Bellare, Mihir, Joe Kilian und Phillip Rogaway: The Security of Cipher Block Chaining .
In: Desmedt, Yvo (Herausgeber): Advances in Cryptology - CRYPTO '94, 14th Annual
International Cryptology Conference, Proceedings , Band 839 der Reihe Lecture Notes in
Computer Science , Seiten 341-358. Springer, 1994.
[21] Bellare, Mihir, Joe Kilian und Phillip Rogaway: The Security of the Cipher Block
Chaining Message Authentication Code . Journal of Computer and System Sciences,
61(3):362-399, 2000.
[22] Bellare, Mihir und Tadayoshi Kohno: Hash Function Balance and Its Impact on
Birthday Attacks . In: Cachin, Christian und Jan Camenisch (Herausgeber): Advances
in Cryptology - EUROCRYPT 2004, International Conference on the Theory and
Applications of Cryptographic Techniques, Proceedings , Band 3027 der Reihe Lecture
Notes in Computer Science , Seiten 401-418. Springer, 2004.
Search WWH ::




Custom Search