4 \ifx\url\undefined\let\url\texttt\fi
5 \ifx\msgid\undefined\let\msgid\texttt\fi
11 author = "Mark Wooding"
,
12 title = "
{Storin
}: A block cipher for digitial signal processors"
,
13 institution = "Straylight
/Edgeware"
,
15 url
= "http
://www.excessus.demon.co.uk
/crypto
/storin.ps.gz"
,
17 "We present Storin
: a new
96-bit block cipher designed to play to the
18 strengths of current digital signal processors
(DSPs
). In particular
, DSPs
19 tend to provide single
-cycle multiply
-and
-accumulate operations
, making
20 matrix multiplications very cheap. Working in an environment where
21 multiplication is as fast as exclusive
-or changes the usual perceptions
22 about which operations provide good cryptographic strength cheaply. The
23 scarcity of available memory
, for code and for tables
, and a penalty for
24 nonsequential access to data also make traditional block ciphers based
25 around substitution tables unsuitable."
30 author = "Joan Daemen"
,
31 title = "Cipher and hash function design strategies based on linear and
32 differential cryptanalysis"
,
34 school = "K. U. Leuven"
38 Fisher
:2000:Storin
-collide
,
39 author = "Matthew Fisher"
,
40 title = "Re
: Yet another block cipher
: {Storin
}"
,
41 howpublished = "Usenet article in
{\texttt
{sci.crypt
}}"
,
43 note = "Message
-id
{\msgid
{<8gjctn\$
9ct\$
1@nnrp1.deja.com
>}}"
47 Wooding
:2000:Storin
-diff
,
48 author = "Mark Wooding"
,
49 title = "Re
: Yet another block cipher
: {Storin
}"
,
50 howpublished = "Usenet article in \texttt
{sci.crypt
}"
,
52 note = "Message
-id
{\msgid
{<slrn8iqhaq
.872.mdw@mull.ncipher.com
>}}"
55 @PhdThesis
{IWJ
:1997:WGT
,
56 Author
= "Ian Jackson"
,
57 title = "Who goes there? Location confidentiality through
60 school = "Cambridge University Computer Laboratory"
,
62 url
= "http
://www.chiark.greenend.org.uk
/~ijackson
/thesis
/"
65 @inproceedings
{Rogaway
:2002:AEAD
,
66 author = "Phillip Rogaway"
,
67 title = "Authenticated
-Encryption with Associated Data"
,
69 booktitle = "
{ACM
} Conference on Computer and Communications Security"
,
70 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/"
73 @inproceedings
{Rogaway
:2001:OCB
,
74 author = "Phillip Rogaway and Mihir Bellare and John Black
76 title = "
{OCB
}: a block
-cipher mode of operation for efficient
77 authenticated encryption"
,
78 booktitle = "
{ACM
} Conference on Computer and Communications Security"
,
81 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/ocb
/"
85 author = {Tadayoshi Kohno and John Viega and Doug Whiting
},
86 title = {The CWC Authenticated Encryption
(Associated Data
) Mode
},
87 howpublished = {Cryptology ePrint Archive
, Report
2003/106},
89 url
= "http
://eprint.iacr.org
/"
,
92 @inproceedings
{Lim
:1997:KRA
,
93 author = "Chae Hoon Lim and Pil Joong Lee"
,
94 title = "A Key Recovery Attack On Discrete Log
-based Schemes Using a
95 Prime Order Subgroup"
,
96 booktitle = "
{CRYPTO
}"
,
99 url
= "http
://citeseer.nj.nec.com
/article
/lim97key.html"
103 author = "
{United States. National Bureau of Standards
}"
,
104 title = "
{FIPS
} Pub
81: {DES
} Modes of Operation"
,
106 address = pub
-NBS
:adr
,
111 series = "FIPS Pub
; 81"
,
112 acknowledgement
= ack
-nhfb
,
113 keywords = "Computer networks
--- Security measures
--- Standards
;
114 Computers
--- Access control
--- Standards
; Electronic
115 data processing departments
--- Security measures
;
119 @misc
{Canetti
:2001:AKE
,
120 author = "Ran Canetti and Hugo Krawczyk"
,
121 title = "Analysis of Key
-Exchange Protocols and Their Use for Building
125 url
= "http
://eprint.iacr.org
/2001/040.ps.gz"
,
126 note = "An extended
abstract appears in the proceedings of Eurocrypt
2001."
129 @misc
{Krawczyk
:2001:OEA
,
130 author = "Hugo Krawczyk"
,
131 title = "The order of encryption and authentication for protecting
132 communications
(Or
: how secure is
{SSL
}?
)"
,
135 url
= "http
://eprint.iacr.org
/2001/045.ps.gz"
,
136 note = "An abridged version appears in the proceedings of
{CRYPTO
} 2001."
139 @techreport
{Frier
:1996:SSL
,
140 author = "A. Frier and P. Karlton and P. Kocher"
,
141 title = "The
{SSL
3.0} Protocol"
,
142 institution = "Netscape Communications Corp."
,
145 url
= "http
://home.netscape.com
/eng
/ssl3
/ssl
-toc.html"
149 author = "T. Dierks and C. Allen"
,
150 title = "
{RFC
2264}: The
{TLS
} Protocol
-- Version
1"
,
152 howpublished = "Internet Request for Comments"
,
153 url
= "ftp
://ftp.internic.net
/rfc
/rfc2246.txt"
156 @misc
{Ylonen
:2001:STL
,
157 author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
159 title = "
{SSH
} Transport Layer Protocol"
,
162 howpublished = "Internet Draft"
,
163 url
= "http
://www.ietf.org
/internet
-drafts
/draft
-ietf
-secsh
-transport
-09.txt"
166 @inproceedings
{Bellare
:1993:ROP
,
167 author = "Mihir Bellare and Phillip Rogaway"
,
168 title = "Random oracles are practical"
,
169 booktitle = "Proceedings of the First Annual Conference on Computer and
170 Communications Security"
,
171 organization = "
{ACM
}"
,
173 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/ro.html"
176 @inproceedings
{Brassard
:1989:SZK
,
177 author = "Gilles Brassard and Claude Crepeau"
,
178 title = "Sorting out Zero
-Knowledge"
,
179 booktitle = "Theory and Application of Cryptographic Techniques"
,
182 url
= "http
://citeseer.nj.nec.com
/brassard90sorting.html"
185 @inproceedings
{Bellare
:2000:CST
,
186 author = "Mihir Bellare and Anand Desai and E. Jokipii and Phillip Rogaway"
,
187 title = "A Concrete Security Treatment of Symmetric Encryption"
,
188 booktitle = "
{IEEE
} Symposium on Foundations of Computer Science"
,
191 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/sym
-enc.html"
194 @misc
{Goldwasser
:1999:LNC
,
195 author = "Shafi Goldwasser and Mihir Bellare"
,
196 title = "Lecture Notes on Cryptography"
,
197 howpublished = "Summer Course ``Cryptography and Computer Security'' at MIT
, 1996--1999"
,
199 url
= "http
://citeseer.nj.nec.com
/goldwasser96lecture.html"
202 @techreport
{Abdalla
:1999:DHAES
,
203 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway"
,
204 title = "
{DHAES
}: An Encryption Scheme Based on the
{Diffie
-Hellman
} Problem"
,
207 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/pke.html"
210 @inproceedings
{Abdalla
:2001:DHIES
,
211 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway"
,
212 title = "
{DHIES
}: An Encryption Scheme Based on the
{Diffie
-Hellman
} Problem"
,
213 crossref
= "Naccache
:2001:TCC"
,
215 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/dhies.html"
218 @inproceedings
{Shoup
:2001:OAEPR
,
220 title = "
{OAEP
} reconsidered"
,
221 crossref
= "Kilian
:2001:ACC"
,
223 url
= "http
://www.shoup.net
/papers
/"
226 @inproceedings
{Wagner
:2000:PSU
,
227 author = "David Wagner and Ian Goldberg"
,
228 title = "Proofs of Security for the
{Unix
} Password Hashing Algorithm"
,
229 crossref
= "Okamoto
:2000:ACA"
,
231 url
= "http
://www.cs.berkeley.edu
/~daw
/papers
/"
234 @inproceedings
{Brier
:2001:CRS
,
235 author = "Eric Brier and Cristophe Clavier and Jean
-S\'ebastien Coron and
237 title = "Cryptanalysis of
{RSA
} Signatures with Fixed
-Patten Padding"
,
239 crossref
= "Kilian
:2001:ACC"
,
243 @inproceedings
{ Alkassar
:2001:OSS
,
244 author = "Ammar Alkassar and Alexander Geraldy and Birgit Pfitzmann and Ahmad
-Reza Sadeghi"
,
245 title = "Optimized Self
-Synchronizing Mode of Operation"
,
246 crossref
= "DBLP
:conf
/fse
/2001"
,
248 url
= "http
://citeseer.nj.nec.com
/alkassar01optimized.html"
}
250 @unpublished
{Shoup
:2001:PIS
,
251 author = "Victor Shoup"
,
252 title = "Proposal for an
{ISO
} Standard for Public Key Encryption
255 note = "Unpublished manuscript"
,
256 url
= "http
://www.shoup.net
/papers
/"
259 @proceedings
{DBLP
:conf
/fse
/2001,
260 editor = {Mitsuru Matsui
},
261 title = {Fast Software Encryption
, 8th International Workshop
, FSE
2001
262 Yokohama
, Japan
, April
2-4, 2001, Revised Papers
},
264 publisher = {Springer
},
265 series = {Lecture Notes in Computer Science
},
268 isbn
= {3-540-43869-6},
269 bibsource
= {DBLP
, http
://dblp.uni
-trier.de
}