Cryptography Reference
In-Depth Information
[13] Bellare, Mihir:
New Proofs for NMAC and HMAC: Security without Collision-
Resistance
. In: Dwork, Cynthia (Herausgeber):
Advances in Cryptology - CRYPTO
2006, 26th Annual International Cryptology Conference, Proceedings
,Band4117der
Reihe
Lecture Notes in Computer Science
, Seiten 602-619. Springer, 2006.
[14] Bellare, Mihir, Alexandra Boldyreva und Adriana Palacio:
An Uninstantiable Random-
Oracle-Model Scheme for a Hybrid-Encryption Problem
. In: Cachin, Christian und Jan
Camenisch (Herausgeber):
Advances in Cryptology - EUROCRYPT 2004, International
Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
,
Band 3027 der Reihe
Lecture Notes in Computer Science
, Seiten 171-188. Springer,
2004.
[15] Bellare, Mihir, Ran Canetti und Hugo Krawczyk:
Keying Hash Functions for Message
Authentication
. In: Koblitz, Neal (Herausgeber):
Advances in Cryptology - CRYPTO
'96, 16th Annual International Cryptology Conference, Proceedings
,Band1109der
Reihe
Lecture Notes in Computer Science
, Seiten 1-15. Springer, 1996.
[16] Bellare, Mihir, Anand Desai, Eron Jokipii und Phillip Rogaway:
A Concrete Security
Treatment of Symmetric Encryption
.In:
Proceedings of the 38th Annual Symposium
on Foundations of Computer Science (FOCS 1997)
, Seiten 394-403. IEEE Computer
Society, 1997.
[17] Bellare, Mihir, Oded Goldreich und Anton Mityagin:
The Power of Verification Queries
in Message Authentication and Authenticated Encryption
. Cryptology ePrint Archive,
Report 2004/309, 2004.
http://eprint.iacr.org/
.
[18] Bellare, Mihir, Roch Guérin und Phillip Rogaway:
XOR MACs: New Methods for
Message Authentication Using Finite Pseudorandom Functions
. In: Coppersmith, Don
(Herausgeber):
Advances in Cryptology - CRYPTO '95, 15th Annual International
Cryptology Conference, Proceedings
, Band 963 der Reihe
Lecture Notes in Computer
Science
, Seiten 15-28. Springer, 1995.
[19] Bellare, Mihir, Dennis Hofheinz und Eike Kiltz:
Subtleties in the Definition of
IND-CCA: When and How Should Challenge-Decryption be Disallowed?
Cryptology
ePrint Archive, Report 2009/418, 2009.
http://eprint.iacr.org/
.
[20] Bellare, Mihir, Joe Kilian und Phillip Rogaway:
The Security of Cipher Block Chaining
.
In: Desmedt, Yvo (Herausgeber):
Advances in Cryptology - CRYPTO '94, 14th Annual
International Cryptology Conference, Proceedings
, Band 839 der Reihe
Lecture Notes in
Computer Science
, Seiten 341-358. Springer, 1994.
[21] Bellare, Mihir, Joe Kilian und Phillip Rogaway:
The Security of the Cipher Block
Chaining Message Authentication Code
. Journal of Computer and System Sciences,
61(3):362-399, 2000.
[22] Bellare, Mihir und Tadayoshi Kohno:
Hash Function Balance and Its Impact on
Birthday Attacks
. In: Cachin, Christian und Jan Camenisch (Herausgeber):
Advances
in Cryptology - EUROCRYPT 2004, International Conference on the Theory and
Applications of Cryptographic Techniques, Proceedings
, Band 3027 der Reihe
Lecture
Notes in Computer Science
, Seiten 401-418. Springer, 2004.