4 \ifx\url\undefined\let\url\texttt\fi
5 \ifx\msgid\undefined\let\msgid\texttt\fi
11 author = "Mark Wooding"
,
12 title = "
{Storin
}: A block cipher for digitial signal processors"
,
13 institution = "Straylight
/Edgeware"
,
15 url
= "http
://www.excessus.demon.co.uk
/crypto
/storin.ps.gz"
,
17 "We present Storin
: a new
96-bit block cipher designed to play to the
18 strengths of current digital signal processors
(DSPs
). In particular
, DSPs
19 tend to provide single
-cycle multiply
-and
-accumulate operations
, making
20 matrix multiplications very cheap. Working in an environment where
21 multiplication is as fast as exclusive
-or changes the usual perceptions
22 about which operations provide good cryptographic strength cheaply. The
23 scarcity of available memory
, for code and for tables
, and a penalty for
24 nonsequential access to data also make traditional block ciphers based
25 around substitution tables unsuitable."
30 author = "Joan Daemen"
,
31 title = "Cipher and hash function design strategies based on linear and
32 differential cryptanalysis"
,
34 school = "K. U. Leuven"
38 Fisher
:2000:Storin
-collide
,
39 author = "Matthew Fisher"
,
40 title = "Re
: Yet another block cipher
: {Storin
}"
,
41 howpublished = "Usenet article in
{\texttt
{sci.crypt
}}"
,
43 note = "Message
-id
{\msgid
{<8gjctn\$
9ct\$
1@nnrp1.deja.com
>}}"
47 Wooding
:2000:Storin
-diff
,
48 author = "Mark Wooding"
,
49 title = "Re
: Yet another block cipher
: {Storin
}"
,
50 howpublished = "Usenet article in \texttt
{sci.crypt
}"
,
52 note = "Message
-id
{\msgid
{<slrn8iqhaq
.872.mdw@mull.ncipher.com
>}}"
57 author = "Mark Wooding"
,
58 title = "New proofs for old modes"
,
59 howpublished = "Unpublished work in progress"
,
63 @PhdThesis
{IWJ
:1997:WGT
,
64 Author
= "Ian Jackson"
,
65 title = "Who goes there? Location confidentiality through
68 school = "Cambridge University Computer Laboratory"
,
70 url
= "http
://www.chiark.greenend.org.uk
/~ijackson
/thesis
/"
73 @inproceedings
{Rogaway
:2002:AEAD
,
74 author = "Phillip Rogaway"
,
75 title = "Authenticated
-Encryption with Associated Data"
,
77 booktitle = "
{ACM
} Conference on Computer and Communications Security"
,
78 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/"
81 @inproceedings
{Rogaway
:2001:OCB
,
82 author = "Phillip Rogaway and Mihir Bellare and John Black
84 title = "
{OCB
}: a block
-cipher mode of operation for efficient
85 authenticated encryption"
,
86 booktitle = "
{ACM
} Conference on Computer and Communications Security"
,
89 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/ocb
/"
93 author = {Tadayoshi Kohno and John Viega and Doug Whiting
},
94 title = {The CWC Authenticated Encryption
(Associated Data
) Mode
},
95 howpublished = {Cryptology ePrint Archive
, Report
2003/106},
97 url
= "http
://eprint.iacr.org
/2003/106"
,
100 @inproceedings
{Lim
:1997:KRA
,
101 author = "Chae Hoon Lim and Pil Joong Lee"
,
102 title = "A Key Recovery Attack On Discrete Log
-based Schemes Using a
103 Prime Order Subgroup"
,
104 booktitle = "
{CRYPTO
}"
,
107 url
= "http
://citeseer.nj.nec.com
/article
/lim97key.html"
111 author = "
{United States. National Bureau of Standards
}"
,
112 title = "
{FIPS
} Pub
81: {DES
} Modes of Operation"
,
114 address = pub
-NBS
:adr
,
119 series = "FIPS Pub
; 81"
,
120 acknowledgement
= ack
-nhfb
,
121 keywords = "Computer networks
--- Security measures
--- Standards
;
122 Computers
--- Access control
--- Standards
; Electronic
123 data processing departments
--- Security measures
;
127 @misc
{Canetti
:2001:AKE
,
128 author = "Ran Canetti and Hugo Krawczyk"
,
129 title = "Analysis of Key
-Exchange Protocols and Their Use for Building
133 url
= "http
://eprint.iacr.org
/2001/040"
,
134 note = "An extended
abstract appears in the proceedings of Eurocrypt
2001."
137 @misc
{Krawczyk
:2001:OEA
,
138 author = "Hugo Krawczyk"
,
139 title = "The order of encryption and authentication for protecting
140 communications
(Or
: how secure is
{SSL
}?
)"
,
143 url
= "http
://eprint.iacr.org
/2001/045"
,
144 note = "An abridged version appears in the proceedings of
{CRYPTO
} 2001."
147 @techreport
{Frier
:1996:SSL
,
148 author = "A. Frier and P. Karlton and P. Kocher"
,
149 title = "The
{SSL
3.0} Protocol"
,
150 institution = "Netscape Communications Corp."
,
153 url
= "http
://home.netscape.com
/eng
/ssl3
/ssl
-toc.html"
157 author = "T. Dierks and C. Allen"
,
158 title = "
{RFC
2264}: The
{TLS
} Protocol
-- Version
1"
,
160 howpublished = "Internet Request for Comments"
,
161 url
= "ftp
://ftp.internic.net
/rfc
/rfc2246.txt"
164 @misc
{Ylonen
:2001:STL
,
165 author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
167 title = "
{SSH
} Transport Layer Protocol"
,
170 howpublished = "Internet Draft"
,
171 url
= "http
://www.ietf.org
/internet
-drafts
/draft
-ietf
-secsh
-transport
-09.txt"
174 @inproceedings
{Bellare
:1993:ROP
,
175 author = "Mihir Bellare and Phillip Rogaway"
,
176 title = "Random oracles are practical"
,
177 booktitle = "Proceedings of the First Annual Conference on Computer and
178 Communications Security"
,
179 organization = "
{ACM
}"
,
181 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/ro.html"
184 @inproceedings
{Brassard
:1989:SZK
,
185 author = "Gilles Brassard and Claude Crepeau"
,
186 title = "Sorting out Zero
-Knowledge"
,
187 booktitle = "Theory and Application of Cryptographic Techniques"
,
190 url
= "http
://citeseer.nj.nec.com
/brassard90sorting.html"
193 @inproceedings
{Bellare
:2000:CST
,
194 author = "Mihir Bellare and Anand Desai and E. Jokipii and Phillip Rogaway"
,
195 title = "A Concrete Security Treatment of Symmetric Encryption"
,
196 booktitle = "
{IEEE
} Symposium on Foundations of Computer Science"
,
199 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/sym
-enc.html"
202 @misc
{Goldwasser
:1999:LNC
,
203 author = "Shafi Goldwasser and Mihir Bellare"
,
204 title = "Lecture Notes on Cryptography"
,
205 howpublished = "Summer Course ``Cryptography and Computer Security'' at MIT
, 1996--1999"
,
207 url
= "http
://citeseer.nj.nec.com
/goldwasser96lecture.html"
211 @InProceedings
{Rogaway
:2002:AEA
,
212 author = "Phillip Rogaway"
,
213 title = "Authenticated
-encryption with associated
-data"
,
214 added
-by
= "msteiner"
,
215 URL
= "http
://www.cs.ucdavis.edu
/~rogaway
/papers
/ad.html"
,
217 added
-at
= "Sun Nov
16 12:50:24 2003"
,
218 abstract = "When a message is transformed into a ciphertext in a
219 way designed to protect both its privacy and
220 authenticity
, there may be additional information
, such
221 as a packet header
, that travels alongside the
222 ciphertext
(at least conceptually
) and must get
223 authenticated with it. We formalize and investigate
224 this authenticated
-encryption with associated
-data
225 (AEAD
) problem. Though the problem has long been
226 addressed in cryptographic practice
, it was never
227 provided a definition or even a name. We do this
, and
228 go on to look at efficient solutions for AEAD
, both in
229 general and for the authenticated
-encryption scheme
230 OCB. For the general setting we study two simple ways
231 to turn an authenticated
-encryption scheme that does
232 not support associated
-data into one that does
: nonce
233 stealing and ciphertext translation. For the case of
234 OCB we construct an AEAD
-scheme by combining OCB and
235 the pseudorandom function PMAC
, using the same
key for
236 both algorithms. We prove that
, despite
237 {"
}interaction
{"
} between the two schemes when using a
238 common
key, the combination is sound. We also consider
239 achieving AEAD by the generic composition of a
240 nonce
-based
, privacy
-only encryption scheme and a
241 pseudorandom function."
,
242 booktitle = "Proceedings of the
9th
{ACM
} Conference on Computer
243 and Communications Security"
,
245 editor = "Ravi Sandhu"
,
247 publisher = "ACM Press"
,
248 address = "Washington
, DC
, USA"
,
251 @Article
{Rogaway
:2003:OCB
,
252 author = "Phillip Rogaway and Mihir Bellare and John Black"
,
253 title = "
{OCB
}: a block
-cipher mode of operation for efficient
254 authenticated encryptiona"
,
255 added
-by
= "msteiner"
,
256 URL
= "http
://www.cs.colorado.edu
/~jrblack
/papers
/ocb.pdf"
,
257 journal = "ACM Transactions on Information and System Security"
,
262 added
-at
= "Sun Sep
28 21:27:38 2003"
,
265 @InProceedings
{McGrew
:2004:SPG
,
266 title = "The Security and Performance of the Galois
/Counter
267 Mode
({GCM
}) of Operation"
,
268 author = "David A. McGrew and John Viega"
,
269 bibdate
= "
2004-12-13"
,
271 http
://dblp.uni
-trier.de
/db
/conf
/indocrypt
/indocrypt2004.html#McGrewV04"
,
272 booktitle = "INDOCRYPT"
,
273 booktitle = "Progress in Cryptology
- {INDOCRYPT
} 2004, 5th
274 International Conference on Cryptology in India
,
275 Chennai
, India
, December
20-22, 2004, Proceedings"
,
276 publisher = "Springer"
,
279 editor = "Anne Canteaut and Kapalee Viswanathan"
,
280 ISBN
= "
3-540-24130-2"
,
282 series = "Lecture Notes in Computer Science"
,
283 URL
= "http
://eprint.iacr.org
/2004/193"
286 @techreport
{Abdalla
:1999:DHAES
,
287 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway"
,
288 title = "
{DHAES
}: An Encryption Scheme Based on the
{Diffie
-Hellman
} Problem"
,
291 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/pke.html"
294 @inproceedings
{Abdalla
:2001:DHIES
,
295 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway"
,
296 title = "
{DHIES
}: An Encryption Scheme Based on the
{Diffie
-Hellman
} Problem"
,
297 crossref
= "Naccache
:2001:TCC"
,
299 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/dhies.html"
302 @inproceedings
{Shoup
:2001:OAEPR
,
304 title = "
{OAEP
} reconsidered"
,
305 crossref
= "Kilian
:2001:ACC"
,
307 url
= "http
://www.shoup.net
/papers
/"
310 @inproceedings
{Wagner
:2000:PSU
,
311 author = "David Wagner and Ian Goldberg"
,
312 title = "Proofs of Security for the
{Unix
} Password Hashing Algorithm"
,
313 crossref
= "Okamoto
:2000:ACA"
,
315 url
= "http
://www.cs.berkeley.edu
/~daw
/papers
/"
318 @inproceedings
{Brier
:2001:CRS
,
319 author = "Eric Brier and Cristophe Clavier and Jean
-S\'ebastien Coron and
321 title = "Cryptanalysis of
{RSA
} Signatures with Fixed
-Patten Padding"
,
323 crossref
= "Kilian
:2001:ACC"
,
327 @inproceedings
{ Alkassar
:2001:OSS
,
328 author = "Ammar Alkassar and Alexander Geraldy and Birgit Pfitzmann and Ahmad
-Reza Sadeghi"
,
329 title = "Optimized Self
-Synchronizing Mode of Operation"
,
330 crossref
= "DBLP
:conf
/fse
/2001"
,
332 url
= "http
://citeseer.nj.nec.com
/alkassar01optimized.html"
}
334 @unpublished
{Shoup
:2001:PIS
,
335 author = "Victor Shoup"
,
336 title = "Proposal for an
{ISO
} Standard for Public Key Encryption
339 note = "Unpublished manuscript"
,
340 url
= "http
://www.shoup.net
/papers
/"
343 @inproceedings
{Shoup
:1997:LBD
,
344 author = "Victor Shoup"
,
345 title = "Lower bounds for discrete logarithms and related problems"
,
347 url
= "http
://www.shoup.net
/papers
/"
,
348 crossref
= "Fumy
:1997:ACE"
351 @InProceedings
{Bellare
:2004:EAX
,
352 title = "The
{EAX
} Mode of Operation"
,
353 author = "Mihir Bellare and Phillip Rogaway and David Wagner"
,
354 bibdate
= "
2004-07-29"
,
356 http
://dblp.uni
-trier.de
/db
/conf
/fse
/fse2004.html#BellareRW04"
,
358 booktitle = "Fast Software Encryption
, 11th International Workshop
,
359 {FSE
} 2004, Delhi
, India
, February
5-7, 2004, Revised
361 publisher = "Springer"
,
364 editor = "Bimal K. Roy and Willi Meier"
,
365 ISBN
= "
3-540-22171-9"
,
367 series = "Lecture Notes in Computer Science"
,
368 URL
= "http
://www.cs.berkeley.edu
/~daw
/papers
/eax
-fse04.ps"
371 @Misc
{Shoup
:1999:OFM
,
372 title = "On Formal Models for Secure Key Exchange"
,
373 author = "Victor Shoup"
,
376 abstract = "A new formal security model for session
key exchange
377 protocols in the public
key setting is proposed
, and
378 several efficient protocols are analyzed in this model.
379 The relationship between this new model and previously
380 proposed models is explored
, and several interesting
,
381 subtle distinctions between static and adaptive
382 adversaries are explored. We also give a brief account
383 of anonymous users."
,
384 citeseer
-references
= "oai
:CiteSeerPSU
:100248; oai
:CiteSeerPSU
:159141;
385 oai
:CiteSeerPSU
:587558; oai
:CiteSeerPSU
:70784;
386 oai
:CiteSeerPSU
:459391; oai
:CiteSeerPSU
:340126;
387 oai
:CiteSeerPSU
:343528; oai
:CiteSeerPSU
:451555;
388 oai
:CiteSeerPSU
:432396"
,
389 annote = "Victor Shoup
(IBM Zurich Research Lab
, Saumerstr
; 4 ,
390 8803 Ruschlikon
, Switzerland
);"
,
391 bibsource
= "OAI
-PMH server at cs1.ist.psu.edu"
,
392 oai
= "oai
:CiteSeerPSU
:190779"
,
393 rights
= "unrestricted"
,
394 URL
= "http
://www.shoup.net
/papers
/skey.ps.Z"
,
397 @misc
{Koblitz
:2006:ALP
,
398 author = {Neal Koblitz and Alfred Menezes
},
399 title = {Another Look at ``Provable Security''.
{II
}},
400 howpublished = {Cryptology ePrint Archive
, Report
2006/229},
402 url
= {http
://eprint.iacr.org
/2006/229},
405 @Article
{Blake
-Wilson
:1998:EAA
,
406 author = "S. Blake
-Wilson and A. Menezes"
,
407 title = "Entity Authentication and Authenticated Key Transport
408 Protocols Employing Asymmetric Techniques"
,
409 journal = "Lecture Notes in Computer Science"
,
415 bibdate
= "Tue Apr
28 08:51:33 MDT
1998"
,
416 acknowledgement
= "Nelson H. F. Beebe
, Center for Scientific
417 Computing
, University of Utah
, Department of
418 Mathematics
, 110 LCB
, 155 S
1400 E RM
233, Salt Lake
419 City
, UT
84112-0090, USA
, Tel
: +1 801 581 5254, FAX
: +1
420 801 581 4148, e
-mail
: \path|beebe@math.utah.edu|
,
421 \path|beebe@acm.org|
, \path|beebe@computer.org|
,
422 \path|beebe@ieee.org|
(Internet
), URL
:
423 \path|http
://www.math.utah.edu
/~beebe
/|"
,
424 url
= "http
://www.cacr.math.uwaterloo.ca
/~ajmeneze
/publications
/transport.ps"
427 @Article
{Blake
-Wilson
:1997:KAP
,
428 author = "S. Blake
-Wilson and D. Johnson and A. Menezes"
,
429 title = "Key Agreement Protocols and Their Security Analysis"
,
430 journal = "Lecture Notes in Computer Science"
,
436 bibdate
= "Tue Apr
28 08:51:33 MDT
1998"
,
437 acknowledgement
= "Nelson H. F. Beebe
, University of Utah
, Department
438 of Mathematics
, 110 LCB
, 155 S
1400 E RM
233, Salt Lake
439 City
, UT
84112-0090, USA
, Tel
: +1 801 581 5254, FAX
: +1
440 801 581 4148, e
-mail
: \path|beebe@math.utah.edu|
,
441 \path|beebe@acm.org|
, \path|beebe@computer.org|
443 \path|http
://www.math.utah.edu
/~beebe
/|"
,
444 url
= "http
://www.cacr.math.uwaterloo.ca
/~ajmeneze
/publications
/agreement.ps"
447 @InProceedings
{Bellare
:1998:MAD
,
448 author = "Mihir Bellare and Ran Canetti and Hugo Krawczyk"
,
449 title = "A Modular Approach to the Design and Analysis of Key
452 ISBN
= "
0-89791-962-9"
,
453 booktitle = "Proceedings of the
30th Annual
{ACM
} Symposium on
454 Theory of Computing
({STOC
}-98)"
,
455 month = may # "~
23--26"
,
456 publisher = "ACM Press"
,
457 address = "New York"
,
459 url
= "http
://www.cs.ucsd.edu
/~mihir
/papers
/key-distribution.html"
462 @TechReport
{Canetti
:2001:UCS
,
463 author = "Ran Canetti"
,
464 title = "Universally Composable Security
: {A
} New Paradigm for
465 Cryptographic Protocols"
,
467 URL
= "http
://eprint.iacr.org
/2000/067"
,
470 abstract = "We propose a new paradigm for defining security of
471 cryptographic protocols
, called
{\sf universally
472 composable security.
} The salient property of
473 universally composable definitions of security is that
474 they guarantee security even when a secure protocol is
475 composed with an arbitrary set of protocols
, or more
476 generally when the protocol is used as a component of
477 an arbitrary system. This is an essential property for
478 maintaining security of cryptographic protocols in
479 complex and unpredictable environments such as the
480 Internet. In particular
, universally composable
481 definitions guarantee security even when an unbounded
482 number of protocol instances are executed concurrently
483 in an adversarially controlled manner
, they guarantee
484 non
-malleability with respect to arbitrary protocols
,
485 and more. We show how to formulate universally
486 composable definitions of security for practically any
487 cryptographic task. Furthermore
, we demonstrate that
488 practically any such definition can be realized using
489 known general techniques
, as long as only a minority of
490 the participants are corrupted. We then proceed to
491 formulate universally composable definitions of a wide
492 array of cryptographic tasks
, including authenticated
493 and secure communication
, key-exchange
, public
-key
494 encryption
, signature
, commitment
, oblivious transfer
,
495 zero
-knowledge
, and more. We also make initial steps
496 towards studying the realizability of the proposed
497 definitions in other natural settings."
,
498 keywords = "foundations
/ cryptographic protocols
, security
499 analysis of protocols
, concurrent composition"
,
501 annote = "Revised version of \cite
{Canett2000a
}."
,
503 institution = "Cryptology
{ePrint
} Archive"
,
504 added
-at
= "Wed Oct
17 16:02:37 2001"
,
505 note = "Extended Abstract appeared in proceedings of the
42nd
506 Symposium on Foundations of Computer Science
(FOCS
),
510 @Article
{Canett2000a
,
511 author = "Ran Canetti"
,
512 title = "Security and Composition of Multiparty Cryptographic
515 URL
= "http
://link.springer
-ny.com
/link
/service
/journals
/00145/papers
/0013001/00130143.pdf"
,
516 journal = "Journal of Cryptology"
,
519 abstract = "We present general definitions of security for
520 multiparty cryptographic protocols
, with focus on the
521 task of evaluating a probabilistic function of the
522 parties' inputs. We show that
, with respect to these
523 definitions
, security is preserved under a natural
524 composition operation. The definitions follow the
525 general paradigm of known definitions
; yet some
526 substantial modifications and simplifications are
527 introduced. The composition operation is the natural
528 ``subroutine substitution'' operation
, formalized by
529 Micali and Rogaway. We consider several standard
530 settings for multiparty protocols
, including the cases
531 of eavesdropping
, Byzantine
, nonadaptive and adaptive
532 adversaries
, as well as the information
-theoretic and
533 the computational models. In particular
, in the
534 computational model we provide the first definition of
535 security of protocols that is shown to be preserved
538 annote = "Discusses general formalization of Secure Multiparty
539 Computation in synchronous model with passive vs active
540 (=> compute function t
-privately vs t
-securely
) and
541 static vs adaptive adversaries as well as perfect
542 (e.g.
, with secure channel
) and cryptographic settings.
543 Contrary to previous definitions doesn't restrict to
544 black
-box simulations
(though probably that restriction
545 was not that important
) and allows rewinds
(more
546 important
, e.g.
, ZKP
). Probably most precise and
547 complete to date. Proves composition theorems for
548 'sequential subroutine composition'. To model adaptive
549 adversaries he defines an additional TM Z to model the
550 environment which feeds the context as auxiliary input
551 on corruptions as well models post
-execution effects in
552 a non
-erasing model by allowing Z
(on input \emph
{all
}
553 outputs of the protocol
) to further corrupt parties
554 (via adversary
) after the termination of the protocol.
555 The simulation has to hold now for all Z and all A
(but
556 note that contrary to A
, Z is the same in the ideal
557 model
!). However
, if we consider erasing models where
558 all internal states are deleted after protocol
559 terminatin then Z can be simplified to apriori fixed
560 auxilliary strings for each corruption. Appeared also
561 as Theory of Cryptography Library Record
98-18."
,
564 publisher = "Springer
-Verlag
, Berlin Germany"
,
565 added
-at
= "Thu Jul
20 11:01:42 2000"
,
569 @Article
{Canetti
:2002:UCN
,
570 author = "Ran Canetti and Hugo Krawczyk"
,
571 title = "Universally Composable Notions of Key Exchange and
573 journal = "Lecture Notes in Computer Science"
,
579 bibdate
= "Tue Sep
10 19:09:37 MDT
2002"
,
580 bibsource
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t2332.htm"
,
581 url
= "http
://eprint.iacr.org
/2002/059"
,
582 acknowledgement
= "Nelson H. F. Beebe
, Center for Scientific
583 Computing
, University of Utah
, Department of
584 Mathematics
, 110 LCB
, 155 S
1400 E RM
233, Salt Lake
585 City
, UT
84112-0090, USA
, Tel
: +1 801 581 5254, FAX
: +1
586 801 581 4148, e
-mail
: \path|beebe@math.utah.edu|
,
587 \path|beebe@acm.org|
, \path|beebe@computer.org|
,
588 \path|beebe@ieee.org|
(Internet
), URL
:
589 \path|http
://www.math.utah.edu
/~beebe
/|"
,
592 @misc
{Shoup
:2004:SGT
,
593 author = {Victor Shoup
},
594 title = {Sequences of games
: a tool for taming complexity in security proofs
},
595 howpublished = {Cryptology ePrint Archive
, Report
2004/332},
597 url
= {http
://eprint.iacr.org
/2004/332},
600 @InProceedings
{Bellare
:2006:STE
,
601 title = "The Security of Triple Encryption and a Framework for
602 Code
-Based Game
-Playing Proofs"
,
603 author = "Mihir Bellare and Phillip Rogaway"
,
604 bibdate
= "
2006-07-05"
,
606 http
://dblp.uni
-trier.de
/db
/conf
/eurocrypt
/eurocrypt2006.html#BellareR06"
,
607 booktitle = "Advances in Cryptology
- {EUROCRYPT
} 2006, 25th Annual
608 International Conference on the Theory and Applications
609 of Cryptographic Techniques
, St. Petersburg
, Russia
,
610 May
28 - June
1, 2006, Proceedings"
,
611 publisher = "Springer"
,
614 editor = "Serge Vaudenay"
,
615 ISBN
= "
3-540-34546-9"
,
617 series = "Lecture Notes in Computer Science"
,
618 note = "Proceedings version of \cite
{Bellare
:2004:CBG
}"
621 @misc
{Bellare
:2004:CBG
,
622 author = {Mihir Bellare and Phillip Rogaway
},
623 title = {Code
-Based Game
-Playing Proofs and the Security of Triple Encryption
},
624 howpublished = {Cryptology ePrint Archive
, Report
2004/331},
626 url
= {http
://eprint.iacr.org
/2004/331},
627 note = "Full version of \cite
{Bellare
:2006:STE
}"
630 @Article
{Shoup
:2001:OR
,
631 author = "Victor Shoup"
,
632 title = "
{OAEP
} Reconsidered"
,
633 journal = "Lecture Notes in Computer Science"
,
639 bibdate
= "Sat Feb
2 13:05:41 MST
2002"
,
640 bibsource
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t2139.htm"
,
641 URL
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/2139/21390239.htm
;
642 http
://link.springer
-ny.com
/link
/service
/series/0558/papers
/2139/21390239.pdf"
,
643 acknowledgement
= "Nelson H. F. Beebe
, Center for Scientific
644 Computing
, University of Utah
, Department of
645 Mathematics
, 110 LCB
, 155 S
1400 E RM
233, Salt Lake
646 City
, UT
84112-0090, USA
, Tel
: +1 801 581 5254, FAX
: +1
647 801 581 4148, e
-mail
: \path|beebe@math.utah.edu|
,
648 \path|beebe@acm.org|
, \path|beebe@computer.org|
,
649 \path|beebe@ieee.org|
(Internet
), URL
:
650 \path|http
://www.math.utah.edu
/~beebe
/|"
,
653 @Article
{Canetti
:2004:ROM
,
654 author = "Ran Canetti and Oded Goldreich and Shai Halevi"
,
655 title = "The random oracle methodology
, revisited"
,
656 journal = "Journal of the ACM"
,
664 bibdate
= "Sat Jul
10 09:49:01 MDT
2004"
,
665 bibsource
= "http
://portal.acm.org
/"
,
666 acknowledgement
= "Nelson H. F. Beebe
, University of Utah
, Department
667 of Mathematics
, 110 LCB
, 155 S
1400 E RM
233, Salt Lake
668 City
, UT
84112-0090, USA
, Tel
: +1 801 581 5254, FAX
: +1
669 801 581 4148, e
-mail
: \path|beebe@math.utah.edu|
,
670 \path|beebe@acm.org|
, \path|beebe@computer.org|
672 \path|http
://www.math.utah.edu
/~beebe
/|"
,
675 @Article
{Boneh
:2003:IBE
,
676 author = "Dan Boneh and Matthew Franklin"
,
677 title = "Identity
-Based Encryption from the
{Weil
} Pairing"
,
678 journal = "SIAM Journal on Computing"
,
685 doi
= "http
://dx.doi.org
/10.1137/S0097539701398521"
,
686 ISSN
= "
0097-5397 (print
), 1095-7111 (electronic
)"
,
687 bibdate
= "Wed Aug
20 06:43:35 MDT
2003"
,
688 bibsource
= "http
://epubs.siam.org
/sam
-bin
/dbq
/toclist
/SICOMP
/32/3"
,
689 URL
= "http
://epubs.siam.org
/sam
-bin
/dbq
/article
/39852"
,
690 acknowledgement
= "Nelson H. F. Beebe
, University of Utah
, Department
691 of Mathematics
, 110 LCB
, 155 S
1400 E RM
233, Salt Lake
692 City
, UT
84112-0090, USA
, Tel
: +1 801 581 5254, FAX
: +1
693 801 581 4148, e
-mail
: \path|beebe@math.utah.edu|
,
694 \path|beebe@acm.org|
, \path|beebe@computer.org|
696 \path|http
://www.math.utah.edu
/~beebe
/|"
,
697 doi
-url
= "http
://dx.doi.org
/10.1137/S0097539701398521"
,
701 @Article
{ElGamal
:1985:PKC
,
702 author = "Taher ElGamal"
,
703 booktitle = "Advances in cryptology
(Santa Barbara
, Calif.
, 1984)"
,
704 title = "A public
key cryptosystem and a signature scheme based
705 on discrete logarithms"
,
706 journal = "Lecture Notes in Computer Science"
,
712 MRclass
= "
94A60
(11T71
68P25
)"
,
713 MRnumber
= "
87b
:94037"
,
714 mrnumber
-url
= "http
://www.ams.org
/mathscinet
-getitem?mr
=87b
%3a94037",
717 @misc
{Menezes
:2005:IPB
,
718 author = "Alfred Menezes"
,
719 title = "An Introduction to Pairing
-Based Cryptography"
,
720 url
= "http
://www.cacr.math.uwaterloo.ca
/~ajmeneze
/publications
/pairings.pdf"
,
721 note = "Notes from lectures given in Santander
, Spain"
,
725 @misc
{Stinson
:2006:EST
,
726 author = {D.R. Stinson and J. Wu
},
727 title = {An Efficient and Secure Two
-flow Zero
-Knowledge Identification Protocol
},
728 howpublished = {Cryptology ePrint Archive
, Report
2006/337},
730 url
= {http
://eprint.iacr.org
/2006/337},
733 @misc
{DiRaimondo
:2006:DAK
,
734 author = {Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk
},
735 title = {Deniable Authentication and Key Exchange
},
736 howpublished = {Cryptology ePrint Archive
, Report
2006/280},
738 url
= {http
://eprint.iacr.org
/2006/280},
742 author = "
{Certicom Research
}"
,
743 title = "Standards for Efficient Cryptography
, {SEC
} 1: {E
}lliptic curve cryptography
, Version
1.0"
,
745 url
= "http
://www.secg.org
/download
/aid
-385/sec1_final.pdf"
748 @proceedings
{DBLP
:conf
/fse
/2001,
749 editor = {Mitsuru Matsui
},
750 title = {Fast Software Encryption
, 8th International Workshop
, FSE
2001
751 Yokohama
, Japan
, April
2-4, 2001, Revised Papers
},
753 publisher = {Springer
},
754 series = {Lecture Notes in Computer Science
},
757 isbn
= {3-540-43869-6},
758 bibsource
= {DBLP
, http
://dblp.uni
-trier.de
}