Commit | Line | Data |
---|---|---|
38e062db MW |
1 | |
2 | @preamble { | |
3 | " | |
4 | \ifx\url\undefined\let\url\texttt\fi | |
5 | \ifx\msgid\undefined\let\msgid\texttt\fi | |
6 | " | |
7 | } | |
8 | ||
9 | @techreport { | |
10 | Wooding:2000:Storin, | |
11 | author = "Mark Wooding", | |
12 | title = "{Storin}: A block cipher for digitial signal processors", | |
13 | institution = "Straylight/Edgeware", | |
14 | year = "2000", | |
15 | url = "http://www.excessus.demon.co.uk/crypto/storin.ps.gz", | |
16 | abstract = | |
17 | "We present Storin: a new 96-bit block cipher designed to play to the | |
18 | strengths of current digital signal processors (DSPs). In particular, DSPs | |
19 | tend to provide single-cycle multiply-and-accumulate operations, making | |
20 | matrix multiplications very cheap. Working in an environment where | |
21 | multiplication is as fast as exclusive-or changes the usual perceptions | |
22 | about which operations provide good cryptographic strength cheaply. The | |
23 | scarcity of available memory, for code and for tables, and a penalty for | |
24 | nonsequential access to data also make traditional block ciphers based | |
25 | around substitution tables unsuitable." | |
26 | } | |
27 | ||
28 | @PhdThesis{ | |
29 | Daemen:1995:CHF, | |
30 | author = "Joan Daemen", | |
31 | title = "Cipher and hash function design strategies based on linear and | |
32 | differential cryptanalysis", | |
33 | year = 1995, | |
34 | school = "K. U. Leuven" | |
35 | } | |
36 | ||
37 | @misc { | |
38 | Fisher:2000:Storin-collide, | |
39 | author = "Matthew Fisher", | |
40 | title = "Re: Yet another block cipher: {Storin}", | |
41 | howpublished = "Usenet article in {\texttt{sci.crypt}}", | |
42 | year = "2000", | |
43 | note = "Message-id {\msgid{<8gjctn\$9ct\$1@nnrp1.deja.com>}}" | |
44 | } | |
45 | ||
46 | @misc { | |
47 | Wooding:2000:Storin-diff, | |
48 | author = "Mark Wooding", | |
49 | title = "Re: Yet another block cipher: {Storin}", | |
50 | howpublished = "Usenet article in \texttt{sci.crypt}", | |
51 | year = "2000", | |
52 | note = "Message-id {\msgid{<slrn8iqhaq.872.mdw@mull.ncipher.com>}}" | |
53 | } | |
54 | ||
55 | @PhdThesis{IWJ:1997:WGT, | |
56 | Author = "Ian Jackson", | |
57 | title = "Who goes there? Location confidentiality through | |
58 | anonymity", | |
59 | year = 1997, | |
60 | school = "Cambridge University Computer Laboratory", | |
61 | pages = "vi + 97", | |
62 | url = "http://www.chiark.greenend.org.uk/~ijackson/thesis/" | |
63 | } | |
64 | ||
65 | @inproceedings{Rogaway:2002:AEAD, | |
66 | author = "Phillip Rogaway", | |
67 | title = "Authenticated-Encryption with Associated Data", | |
68 | year = 2002, | |
69 | booktitle = "{ACM} Conference on Computer and Communications Security", | |
70 | url = "http://www.cs.ucdavis.edu/~rogaway/" | |
71 | } | |
72 | ||
73 | @inproceedings{Rogaway:2001:OCB, | |
74 | author = "Phillip Rogaway and Mihir Bellare and John Black | |
75 | and Ted Krovetz", | |
76 | title = "{OCB}: a block-cipher mode of operation for efficient | |
77 | authenticated encryption", | |
78 | booktitle = "{ACM} Conference on Computer and Communications Security", | |
79 | pages = "196-205", | |
80 | year = "2001", | |
81 | url = "http://www.cs.ucdavis.edu/~rogaway/ocb/" | |
82 | } | |
83 | ||
84 | @misc{Kohno:2003:CWC, | |
85 | author = {Tadayoshi Kohno and John Viega and Doug Whiting}, | |
86 | title = {The CWC Authenticated Encryption (Associated Data) Mode}, | |
87 | howpublished = {Cryptology ePrint Archive, Report 2003/106}, | |
88 | year = {2003}, | |
89 | url = "http://eprint.iacr.org/", | |
90 | } | |
91 | ||
92 | @inproceedings{Lim:1997:KRA, | |
93 | author = "Chae Hoon Lim and Pil Joong Lee", | |
94 | title = "A Key Recovery Attack On Discrete Log-based Schemes Using a | |
95 | Prime Order Subgroup", | |
96 | booktitle = "{CRYPTO}", | |
97 | pages = "249-263", | |
98 | year = 1997, | |
99 | url = "http://citeseer.nj.nec.com/article/lim97key.html" | |
100 | } | |
101 | ||
102 | @Periodical{FIPS81, | |
103 | author = "{United States. National Bureau of Standards}", | |
104 | title = "{FIPS} Pub 81: {DES} Modes of Operation", | |
105 | publisher = pub-NBS, | |
106 | address = pub-NBS:adr, | |
107 | day = "2", | |
108 | month = dec, | |
109 | year = "1981", | |
110 | CODEN = "FIPPAT", | |
111 | series = "FIPS Pub; 81", | |
112 | acknowledgement = ack-nhfb, | |
113 | keywords = "Computer networks --- Security measures --- Standards; | |
114 | Computers --- Access control --- Standards; Electronic | |
115 | data processing departments --- Security measures; | |
116 | Standards", | |
117 | } | |
118 | ||
119 | @misc{Canetti:2001:AKE, | |
120 | author = "Ran Canetti and Hugo Krawczyk", | |
121 | title = "Analysis of Key-Exchange Protocols and Their Use for Building | |
122 | Secure Channels", | |
123 | month = may, | |
124 | year = 2001, | |
125 | url = "http://eprint.iacr.org/2001/040.ps.gz", | |
126 | note = "An extended abstract appears in the proceedings of Eurocrypt 2001." | |
127 | } | |
128 | ||
129 | @misc{Krawczyk:2001:OEA, | |
130 | author = "Hugo Krawczyk", | |
131 | title = "The order of encryption and authentication for protecting | |
132 | communications (Or: how secure is {SSL}?)", | |
133 | month = jun, | |
134 | year = 2001, | |
135 | url = "http://eprint.iacr.org/2001/045.ps.gz", | |
136 | note = "An abridged version appears in the proceedings of {CRYPTO} 2001." | |
137 | } | |
138 | ||
139 | @techreport{Frier:1996:SSL, | |
140 | author = "A. Frier and P. Karlton and P. Kocher", | |
141 | title = "The {SSL 3.0} Protocol", | |
142 | institution = "Netscape Communications Corp.", | |
143 | month = nov, | |
144 | year = "1996", | |
145 | url = "http://home.netscape.com/eng/ssl3/ssl-toc.html" | |
146 | } | |
147 | ||
148 | @misc{RFC2246, | |
149 | author = "T. Dierks and C. Allen", | |
150 | title = "{RFC 2264}: The {TLS} Protocol -- Version 1", | |
151 | year = 1999, | |
152 | howpublished = "Internet Request for Comments", | |
153 | url = "ftp://ftp.internic.net/rfc/rfc2246.txt" | |
154 | } | |
155 | ||
156 | @misc{Ylonen:2001:STL, | |
157 | author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and | |
158 | S. Lehtinen", | |
159 | title = "{SSH} Transport Layer Protocol", | |
160 | month = jan, | |
161 | year = 2001, | |
162 | howpublished = "Internet Draft", | |
163 | url = "http://www.ietf.org/internet-drafts/draft-ietf-secsh-transport-09.txt" | |
164 | } | |
165 | ||
166 | @inproceedings{Bellare:1993:ROP, | |
167 | author = "Mihir Bellare and Phillip Rogaway", | |
168 | title = "Random oracles are practical", | |
169 | booktitle = "Proceedings of the First Annual Conference on Computer and | |
170 | Communications Security", | |
171 | organization = "{ACM}", | |
172 | year = 1993, | |
173 | url = "http://www-cse.ucsd.edu/users/mihir/papers/ro.html" | |
174 | } | |
175 | ||
176 | @inproceedings{Brassard:1989:SZK, | |
177 | author = "Gilles Brassard and Claude Crepeau", | |
178 | title = "Sorting out Zero-Knowledge", | |
179 | booktitle = "Theory and Application of Cryptographic Techniques", | |
180 | pages = "181-191", | |
181 | year = "1989", | |
182 | url = "http://citeseer.nj.nec.com/brassard90sorting.html" | |
183 | } | |
184 | ||
185 | @inproceedings{Bellare:2000:CST, | |
186 | author = "Mihir Bellare and Anand Desai and E. Jokipii and Phillip Rogaway", | |
187 | title = "A Concrete Security Treatment of Symmetric Encryption", | |
188 | booktitle = "{IEEE} Symposium on Foundations of Computer Science", | |
189 | pages = "394-403", | |
190 | year = "1997", | |
191 | url = "http://www-cse.ucsd.edu/users/mihir/papers/sym-enc.html" | |
192 | } | |
193 | ||
194 | @misc{Goldwasser:1999:LNC, | |
195 | author = "Shafi Goldwasser and Mihir Bellare", | |
196 | title = "Lecture Notes on Cryptography", | |
197 | howpublished = "Summer Course ``Cryptography and Computer Security'' at MIT, 1996--1999", | |
198 | year = "1999", | |
199 | url = "http://citeseer.nj.nec.com/goldwasser96lecture.html" | |
200 | } | |
201 | ||
202 | @techreport{Abdalla:1999:DHAES, | |
203 | author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway", | |
204 | title = "{DHAES}: An Encryption Scheme Based on the {Diffie-Hellman} Problem", | |
205 | number = "99-07", | |
206 | year = "1999", | |
207 | url = "http://www-cse.ucsd.edu/users/mihir/papers/pke.html" | |
208 | } | |
209 | ||
210 | @inproceedings{Abdalla:2001:DHIES, | |
211 | author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway", | |
212 | title = "{DHIES}: An Encryption Scheme Based on the {Diffie-Hellman} Problem", | |
213 | crossref = "Naccache:2001:TCC", | |
214 | year = 2001, | |
215 | url = "http://www-cse.ucsd.edu/users/mihir/papers/dhies.html" | |
216 | } | |
217 | ||
218 | @inproceedings{Shoup:2001:OAEPR, | |
219 | author = "V. Shoup", | |
220 | title = "{OAEP} reconsidered", | |
221 | crossref = "Kilian:2001:ACC", | |
222 | pages = "239--259", | |
223 | url = "http://www.shoup.net/papers/" | |
224 | } | |
225 | ||
226 | @inproceedings{Wagner:2000:PSU, | |
227 | author = "David Wagner and Ian Goldberg", | |
228 | title = "Proofs of Security for the {Unix} Password Hashing Algorithm", | |
229 | crossref = "Okamoto:2000:ACA", | |
230 | pages = "560--572", | |
231 | url = "http://www.cs.berkeley.edu/~daw/papers/" | |
232 | } | |
233 | ||
234 | @inproceedings{Brier:2001:CRS, | |
235 | author = "Eric Brier and Cristophe Clavier and Jean-S\'ebastien Coron and | |
236 | David Naccache", | |
237 | title = "Cryptanalysis of {RSA} Signatures with Fixed-Patten Padding", | |
238 | year = 2001, | |
239 | crossref = "Kilian:2001:ACC", | |
240 | pages = "433--439" | |
241 | } | |
242 | ||
243 | @inproceedings{ Alkassar:2001:OSS, | |
244 | author = "Ammar Alkassar and Alexander Geraldy and Birgit Pfitzmann and Ahmad-Reza Sadeghi", | |
245 | title = "Optimized Self-Synchronizing Mode of Operation", | |
246 | crossref = "DBLP:conf/fse/2001", | |
247 | year = 2001, | |
248 | url = "http://citeseer.nj.nec.com/alkassar01optimized.html" } | |
249 | ||
250 | @unpublished{Shoup:2001:PIS, | |
251 | author = "Victor Shoup", | |
252 | title = "Proposal for an {ISO} Standard for Public Key Encryption | |
253 | (Version 2.0)", | |
254 | year = 2001, | |
255 | note = "Unpublished manuscript", | |
256 | url = "http://www.shoup.net/papers/" | |
257 | } | |
258 | ||
259 | @proceedings{DBLP:conf/fse/2001, | |
260 | editor = {Mitsuru Matsui}, | |
261 | title = {Fast Software Encryption, 8th International Workshop, FSE 2001 | |
262 | Yokohama, Japan, April 2-4, 2001, Revised Papers}, | |
263 | booktitle = {FSE}, | |
264 | publisher = {Springer}, | |
265 | series = {Lecture Notes in Computer Science}, | |
266 | volume = {2355}, | |
267 | year = {2002}, | |
268 | isbn = {3-540-43869-6}, | |
269 | bibsource = {DBLP, http://dblp.uni-trier.de} | |
270 | } | |
271 |