Cryptography Reference
In-Depth Information
[23] Bellare, Mihir und Chanathip Namprempre: Authenticated Encryption: Relations
among Notions and Analysis of the Generic Composition Paradigm . In: Okamoto,
T. (Herausgeber): Advances in Cryptology - ASIACRYPT 2000, 6th International
Conference on the Theory and Application of Cryptology and Information Security,
Proceedings , Band 1976 der Reihe Lecture Notes in Computer Science , Seiten 531-545.
Springer, 2000.
[24] Bellare, Mihir und Phillip Rogaway: Random Oracles are Practical: A Paradigm for
Designing Ecient Protocols . In: ACM Conference on Computer and Communications
Security (CCS 1993) , Seiten 62-73. ACM Press, 1993.
[25] Bellare, Mihir und Phillip Rogaway: Optimal asymmetric encryption — How to
encrypt with RSA . In: Santis, Alfredo De (Herausgeber): Advances in Cryptology,
EUROCRYPT 1994, Workshop on the Theory and Application of Cryptographic
Techniques , Band 950 der Reihe Lecture Notes in Computer Science , Seiten 92-111.
Springer, 1995.
[26] Bellare, Mihir und Phillip Rogaway: The Exact Security of Digital Signatures - How to
Sign with RSA and Rabin . In: Maurer, Ueli M. (Herausgeber): Advances in Cryptology
- EUROCRYPT '96, International Conference on the Theory and Application of
Cryptographic Techniques, Proceeding , Band 1070 der Reihe Lecture Notes in Computer
Science , Seiten 399-416. Springer, 1996.
[27] Bellare, Mihir und Phillip Rogaway: Code-Based Game-Playing Proofs and the
Security of Triple Encryption . Cryptology ePrint Archive, Report 2004/331, 2004.
http://eprint.iacr.org/ .
[28] Bellare, Mihir, Phillip Rogaway und David Wagner: The EAX Mode of Operation .
In: Roy, Bimal K. und Willi Meier (Herausgeber): Fast Software Encryption,
11th International Workshop, FSE 2004, Revised Papers , Band 3017 der Reihe
Lecture Notes in Computer Science , Seiten 389-407. Springer, 2004. Siehe auch
http://csrc.nist.gov/groups/ST/toolkit/BCM/modes_development.html für weitere
bei NIST eingereichte Betriebsarten.
[29] Bernstein, Daniel J.: Cache-timing Attacks on AES , 2005. Technischer Bericht.
http://cr.yp.to/papers.html#cachetiming .
[30] Bertoni, Guido, Joan Daemen, Michael Peeters und Gilles Van Assche: On the
Indifferentiability of the Sponge Construction . In: Smart, Nigel P. (Herausgeber):
Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Proceedings , Band 4965 der
Reihe Lecture Notes in Computer Science , Seiten 181-197. Springer, 2008.
[31] Biham, Eli und Orr Dunkelman: A Framework for Iterative Hash Functions - HAIFA .
Cryptology ePrint Archive, Report 2007/278, 2007. http://eprint.iacr.org/ .
[32] Biham, Eli und Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems .
Journal of Cryptology, 4(1):3-72, 1991.
[33] Biham, Eli und Adi Shamir: Differential Cryptanalysis of the Data Encryption Standard .
Springer, 1993.
Search WWH ::




Custom Search