%%%--------------------------------------------------------------------------
%%% Initial hacking.
-@preamble {
+@Preamble {
"
\ifx\url\undefined\let\url\texttt\fi
\ifx\msgid\undefined\let\msgid\texttt\fi
%%%--------------------------------------------------------------------------
%%% The main bibliography.
-@InProceedings{Abdalla:2001:DHIES,
- author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway",
- title = "{DHIES}: An Encryption Scheme Based on the
+@InProceedings{abdalla-2001:dhies,
+ author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway",
+ title = "{DHIES}: An Encryption Scheme Based on the
{Diffie--Hellman} Problem",
- crossref = "Naccache:2001:TCC",
- year = 2001,
- url = "http://www-cse.ucsd.edu/users/mihir/papers/dhies.html"
-}
-
-@InProceedings{Alexander:2007:IUA,
- author = "Chris Alexander and Ian Goldberg",
- title = "Improved user authentication in off-the-record messaging",
- booktitle = "WPES",
- year = 2007,
- pages = "41--47",
- ee = "http://doi.acm.org/10.1145/1314333.1314340",
- url = "http://www.cypherpunks.ca/~iang/pubs/impauth.pdf",
- crossref = "DBLP:conf/wpes/2007",
- bibsource = "DBLP, http://dblp.uni-trier.de"
-}
-
-@InProceedings{Bellare:1993:ROP,
- author = "Mihir Bellare and Phillip Rogaway",
- title = "Random oracles are practical",
- booktitle = "Proceedings of the First Annual Conference on Computer and
+ year = 2001,
+ crossref = "Naccache:2001:TCC",
+ url = "http://www-cse.ucsd.edu/users/mihir/papers/dhies.html"
+}
+
+@InProceedings{alexander-goldberg-2007:improved-user-authn-otr,
+ author = "Chris Alexander and Ian Goldberg",
+ title = "Improved user authentication in off-the-record messaging",
+ booktitle = "WPES",
+ year = 2007,
+ pages = "41--47",
+ ee = "http://doi.acm.org/10.1145/1314333.1314340",
+ url = "http://www.cypherpunks.ca/~iang/pubs/impauth.pdf",
+ crossref = "DBLP:conf/wpes/2007",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
+}
+
+@InProceedings{bellare-2004:eax,
+ author = "Mihir Bellare and Phillip Rogaway and David Wagner",
+ title = "The {EAX} Mode of Operation",
+ booktitle = "FSE",
+ year = 2004,
+ editor = "Bimal K. Roy and Willi Meier",
+ volume = 3017,
+ series = "Lecture Notes in Computer Science",
+ pages = "389--407",
+ publisher = "Springer",
+ bibdate = "2004-07-29",
+ bibsource = "DBLP,
+ http://dblp.uni-trier.de/db/conf/fse/fse2004.html#BellareRW04",
+ booktitle = "Fast Software Encryption, 11th International Workshop,
+ {FSE} 2004, Delhi, India, February 5-7, 2004, Revised
+ Papers",
+ isbn = "3-540-22171-9",
+ url = "http://www.cs.berkeley.edu/~daw/papers/eax-fse04.ps"
+}
+
+@InProceedings{bellare-rogaway-1993:random-oracles,
+ author = "Mihir Bellare and Phillip Rogaway",
+ title = "Random oracles are practical",
+ booktitle = "Proceedings of the First Annual Conference on Computer and
Communications Security",
+ year = 1993,
+ pages = "62--73",
organization = "{ACM}",
- year = 1993,
- url = "http://www-cse.ucsd.edu/users/mihir/papers/ro.html",
- pages = "62--73"
+ url = "http://www-cse.ucsd.edu/users/mihir/papers/ro.html"
}
-@InProceedings{Bellare:2004:EAX,
- title = "The {EAX} Mode of Operation",
- author = "Mihir Bellare and Phillip Rogaway and David Wagner",
- bibdate = "2004-07-29",
- bibsource = "DBLP,
- http://dblp.uni-trier.de/db/conf/fse/fse2004.html#BellareRW04",
- booktitle = "FSE",
- booktitle = "Fast Software Encryption, 11th International Workshop,
- {FSE} 2004, Delhi, India, February 5-7, 2004, Revised
- Papers",
- publisher = "Springer",
- year = 2004,
- volume = 3017,
- editor = "Bimal K. Roy and Willi Meier",
- isbn = "3-540-22171-9",
- pages = "389--407",
- series = "Lecture Notes in Computer Science",
- url = "http://www.cs.berkeley.edu/~daw/papers/eax-fse04.ps"
-}
-
-@InProceedings{Bellare:2006:STE,
- title = "The Security of Triple Encryption and a Framework for
+@InProceedings{bellare-rogaway-2006:security-triple-encryption,
+ author = "Mihir Bellare and Phillip Rogaway",
+ title = "The Security of Triple Encryption and a Framework for
Code-Based Game-Playing Proofs",
- author = "Mihir Bellare and Phillip Rogaway",
- bibdate = "2006-07-05",
- bibsource = "DBLP,
- http://dblp.uni-trier.de/db/conf/eurocrypt/eurocrypt2006.html#BellareR06",
- booktitle = "Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual
+ booktitle = "Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual
International Conference on the Theory and Applications of
Cryptographic Techniques, St. Petersburg, Russia, May 28 -
June 1, 2006, Proceedings",
- publisher = "Springer",
- year = 2006,
- volume = 4004,
- editor = "Serge Vaudenay",
- isbn = "3-540-34546-9",
- pages = "409--426",
- series = "Lecture Notes in Computer Science",
- note = "Proceedings version of \cite{cryptoeprint:2004:331}"
-}
-
-@InProceedings{Bernstein:2006:CDH,
- author = "Daniel J. Bernstein",
- title = "Curve25519: New Diffie-Hellman Speed Records",
- booktitle = "Public Key Cryptography - {PKC} 2006, 9th International
+ year = 2006,
+ editor = "Serge Vaudenay",
+ volume = 4004,
+ series = "Lecture Notes in Computer Science",
+ pages = "409--426",
+ publisher = "Springer",
+ note = "Proceedings version of \cite{cryptoeprint:2004:331}",
+ bibdate = "2006-07-05",
+ bibsource = "DBLP,
+ http://dblp.uni-trier.de/db/conf/eurocrypt/eurocrypt2006.html#BellareR06",
+ isbn = "3-540-34546-9"
+}
+
+@InProceedings{bernstein-2005:poly1305,
+ author = "Daniel J. Bernstein",
+ title = "The Poly1305-AES Message-Authentication Code",
+ booktitle = "Fast Software Encryption: 12th International Workshop,
+ {FSE} 2005, Paris, France, February 21-23, 2005, Revised
+ Selected Papers",
+ year = 2005,
+ pages = "32--49",
+ crossref = "DBLP:conf/fse/2005",
+ url = "https://doi.org/10.1007/11502760_3",
+ doi = "10.1007/11502760_3",
+ timestamp = "Tue, 30 May 2017 16:36:53 +0200",
+ biburl = "http://dblp.uni-trier.de/rec/bib/conf/fse/Bernstein05",
+ bibsource = "dblp computer science bibliography, http://dblp.org"
+}
+
+@Misc{bernstein-2005:salsa20,
+ author = "Daniel J. Bernstein",
+ title = "{Salsa20} Specification",
+ howpublished = "Submission to the ECRYPT Stream Cipher project (eSTREAM)",
+ month = apr,
+ year = 2005,
+ url = "https://cr.yp.to/snuffle/spec.pdf"
+}
+
+@InProceedings{bernstein-2006:curve25519,
+ author = "Daniel J. Bernstein",
+ title = "Curve25519: New Diffie-Hellman Speed Records",
+ booktitle = "Public Key Cryptography - {PKC} 2006, 9th International
Conference on Theory and Practice of Public-Key
Cryptography, New York, NY, USA, April 24-26, 2006,
Proceedings",
- pages = "207--228",
- year = 2006,
- crossref = "DBLP:conf/pkc/2006",
- url = "https://cr.yp.to/papers.html#curve25519",
- doi = "10.1007/11745853_14",
- timestamp = "Tue, 30 May 2017 16:36:52 +0200",
- biburl = "http://dblp.uni-trier.de/rec/bib/conf/pkc/Bernstein06",
- bibsource = "dblp computer science bibliography, http://dblp.org"
-}
-
-@InProceedings{Borisov:2004:OTR,
- author = "Nikita Borisov and Ian Goldberg and Eric A. Brewer",
- title = "Off-the-record communication, or, why not to use PGP",
- booktitle = "WPES",
- year = 2004,
- pages = "77--84",
- ee = "http://doi.acm.org/10.1145/1029179.1029200",
- url = "http://www.cypherpunks.ca/otr/otr-wpes.pdf",
- crossref = "DBLP:conf/wpes/2004",
- bibsource = "DBLP, http://dblp.uni-trier.de"
-}
-
-@InProceedings{Brassard:1989:SZK,
- author = "Gilles Brassard and Claude Crepeau",
- title = "Sorting out Zero-Knowledge",
- booktitle = "Theory and Application of Cryptographic Techniques",
- pages = "181--191",
- year = 1989,
- url = "http://citeseer.nj.nec.com/brassard90sorting.html"
-}
-
-@TechReport{Canetti:2001:UCS,
- author = "Ran Canetti",
- title = "Universally Composable Security: {A} New Paradigm for
+ year = 2006,
+ pages = "207--228",
+ crossref = "DBLP:conf/pkc/2006",
+ url = "https://cr.yp.to/papers.html#curve25519",
+ doi = "10.1007/11745853_14",
+ timestamp = "Tue, 30 May 2017 16:36:52 +0200",
+ biburl = "http://dblp.uni-trier.de/rec/bib/conf/pkc/Bernstein06",
+ bibsource = "dblp computer science bibliography, http://dblp.org"
+}
+
+@InProceedings{borisov-2004:off-the-record,
+ author = "Nikita Borisov and Ian Goldberg and Eric A. Brewer",
+ title = "Off-the-record communication, or, why not to use PGP",
+ booktitle = "WPES",
+ year = 2004,
+ pages = "77--84",
+ ee = "http://doi.acm.org/10.1145/1029179.1029200",
+ url = "http://www.cypherpunks.ca/otr/otr-wpes.pdf",
+ crossref = "DBLP:conf/wpes/2004",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
+}
+
+@InProceedings{brassard-crepeau-1989:sorting-zero-knowledge,
+ author = "Gilles Brassard and Claude Crepeau",
+ title = "Sorting out Zero-Knowledge",
+ booktitle = "Theory and Application of Cryptographic Techniques",
+ year = 1989,
+ pages = "181--191",
+ url = "http://citeseer.nj.nec.com/brassard90sorting.html"
+}
+
+@TechReport{canetti-2001:universally-composable-security,
+ author = "Ran Canetti",
+ title = "Universally Composable Security: {A} New Paradigm for
Cryptographic Protocols",
- added-by = "sti",
- url = "http://eprint.iacr.org/2000/067",
- number = "2000/067",
- month = oct,
- abstract = "We propose a new paradigm for defining security of
- cryptographic protocols, called {\sf universally composable
- security.} The salient property of universally composable
- definitions of security is that they guarantee security
- even when a secure protocol is composed with an arbitrary
- set of protocols, or more generally when the protocol is
- used as a component of an arbitrary system. This is an
- essential property for maintaining security of
- cryptographic protocols in complex and unpredictable
- environments such as the Internet. In particular,
- universally composable definitions guarantee security even
- when an unbounded number of protocol instances are executed
- concurrently in an adversarially controlled manner, they
- guarantee non-malleability with respect to arbitrary
- protocols, and more. We show how to formulate universally
- composable definitions of security for practically any
- cryptographic task. Furthermore, we demonstrate that
- practically any such definition can be realized using known
- general techniques, as long as only a minority of the
- participants are corrupted. We then proceed to formulate
- universally composable definitions of a wide array of
- cryptographic tasks, including authenticated and secure
- communication, key-exchange, public-key encryption,
- signature, commitment, oblivious transfer, zero-knowledge,
- and more. We also make initial steps towards studying the
- realizability of the proposed definitions in other natural
- settings.",
- keywords = "foundations / cryptographic protocols, security analysis of
- protocols, concurrent composition",
- type = "Report",
- annote = "Revised version of \cite{Canetti:2000:SCM}.",
- year = 2001,
- institution = "Cryptology {ePrint} Archive",
- added-at = "Wed Oct 17 16:02:37 2001",
- note = "Extended Abstract appeared in proceedings of the 42nd
- Symposium on Foundations of Computer Science (FOCS), 2001"
-}
-
-@PhdThesis{Daemen:1995:CHF,
- author = "Joan Daemen",
- title = "Cipher and hash function design strategies based on linear
+ institution = "Cryptology {ePrint} Archive",
+ year = 2001,
+ type = "Report",
+ number = "2000/067",
+ month = oct,
+ note = "Extended Abstract appeared in proceedings of the 42nd
+ Symposium on Foundations of Computer Science (FOCS), 2001",
+ annote = "Revised version of \cite{Canetti:2000:SCM}.",
+ added-by = "sti",
+ url = "http://eprint.iacr.org/2000/067",
+ abstract = "We propose a new paradigm for defining security of
+ cryptographic protocols, called {\sf universally
+ composable security.} The salient property of universally
+ composable definitions of security is that they guarantee
+ security even when a secure protocol is composed with an
+ arbitrary set of protocols, or more generally when the
+ protocol is used as a component of an arbitrary
+ system. This is an essential property for maintaining
+ security of cryptographic protocols in complex and
+ unpredictable environments such as the Internet. In
+ particular, universally composable definitions guarantee
+ security even when an unbounded number of protocol
+ instances are executed concurrently in an adversarially
+ controlled manner, they guarantee non-malleability with
+ respect to arbitrary protocols, and more. We show how to
+ formulate universally composable definitions of security
+ for practically any cryptographic task. Furthermore, we
+ demonstrate that practically any such definition can be
+ realized using known general techniques, as long as only a
+ minority of the participants are corrupted. We then
+ proceed to formulate universally composable definitions of
+ a wide array of cryptographic tasks, including
+ authenticated and secure communication, key-exchange,
+ public-key encryption, signature, commitment, oblivious
+ transfer, zero-knowledge, and more. We also make initial
+ steps towards studying the realizability of the proposed
+ definitions in other natural settings.",
+ keywords = "foundations / cryptographic protocols, security analysis
+ of protocols, concurrent composition",
+ added-at = "Wed Oct 17 16:02:37 2001"
+}
+
+@Misc{certicom-2000:sec1,
+ author = "{Certicom Research}",
+ title = "Standards for Efficient Cryptography, {SEC} 1: {E}lliptic
+ curve cryptography, Version 1.0",
+ year = 2000,
+ url = "http://www.secg.org/download/aid-385/sec1_final.pdf"
+}
+
+@PhdThesis{daemen-1995:cipher-hash-design,
+ author = "Joan Daemen",
+ title = "Cipher and hash function design strategies based on linear
and differential cryptanalysis",
- year = 1995,
- school = "K. U. Leuven"
+ school = "K. U. Leuven",
+ year = 1995
}
-@Misc{Ellis:1997:SNS,
- author = "James Ellis",
- title = "The Story of Non-Secret Encryption",
- howpublished = "CESG internal document",
- month = dec,
- year = 1997,
- note = "Released internally in 1987.",
- url = "http://www.jya.com/ellisdoc.htm"
+@Manual{dworkin-2010:cbc-ciphertext-stealing,
+ title = "Recommendation for Block Cipher Modes of Operation: Three
+ Variants of Ciphertext Stealing for CBC Mode",
+ author = "Morris Dworkin",
+ organization = pub-NIST,
+ address = pub-NIST:adr,
+ month = oct,
+ year = 2010,
+ note = "Addendum to NIST Special Publication 800-38A",
+ pages = "iv + 7",
+ url = "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf"
}
-@Misc{Ferguson:2005:AWG,
- author = "Niels Ferguson",
- title = "Authentication Weaknesses in {GCM}",
- year = 2005,
- month = "May",
- url = "http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf",
- note = "Public comment to NIST"
+@Misc{ellis-1997:non-secret-encryption,
+ author = "James Ellis",
+ title = "The Story of Non-Secret Encryption",
+ howpublished = "CESG internal document",
+ month = dec,
+ year = 1997,
+ note = "Released internally in 1987.",
+ url = "http://www.jya.com/ellisdoc.htm"
}
-@Misc{Fisher:2000:Storin-collide,
- author = "Matthew Fisher",
- title = "Re: Yet another block cipher: {Storin}",
- howpublished = "Usenet article in {\texttt{sci.crypt}}",
- year = 2000,
- note = "Message-id {\msgid{<8gjctn\$9ct\$1@nnrp1.deja.com>}}"
+@Misc{ferguson-2005:gcm-authn-weakness,
+ author = "Niels Ferguson",
+ title = "Authentication Weaknesses in {GCM}",
+ month = "May",
+ year = 2005,
+ note = "Public comment to NIST",
+ url = "http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf"
}
-@TechReport{Frier:1996:SSL,
- author = "A. Frier and P. Karlton and P. Kocher",
- title = "The {SSL 3.0} Protocol",
- institution = "Netscape Communications Corp.",
- month = nov,
- year = 1996,
- url = "http://home.netscape.com/eng/ssl3/ssl-toc.html"
+@Misc{fisher-2000:storin-usenet,
+ author = "Matthew Fisher",
+ title = "Re: Yet another block cipher: {Storin}",
+ howpublished = "Usenet article in {\texttt{sci.crypt}}",
+ year = 2000,
+ note = "Message-id {\msgid{<8gjctn\$9ct\$1@nnrp1.deja.com>}}"
}
-@Misc{Goldwasser:1999:LNC,
- author = "Shafi Goldwasser and Mihir Bellare",
- title = "Lecture Notes on Cryptography",
+@Misc{goldwasser-bellare-1999:lecture-notes-crypto,
+ author = "Shafi Goldwasser and Mihir Bellare",
+ title = "Lecture Notes on Cryptography",
howpublished = "Summer Course ``Cryptography and Computer Security'' at
MIT, 1996--1999",
- year = 1999,
- url = "http://citeseer.nj.nec.com/goldwasser96lecture.html"
+ year = 1999,
+ url = "http://citeseer.nj.nec.com/goldwasser96lecture.html"
}
-@InProceedings{Groth:2008:ENP,
- author = "Jens Groth and Amit Sahai",
- title = "Efficient Non-interactive Proof Systems for Bilinear
+@InProceedings{groth-sahai-2008:proofs-for-bilinear-groups,
+ author = "Jens Groth and Amit Sahai",
+ title = "Efficient Non-interactive Proof Systems for Bilinear
Groups",
- booktitle = "EUROCRYPT",
- year = 2008,
- pages = "415--432",
- ee = "http://dx.doi.org/10.1007/978-3-540-78967-3_24",
- crossref = "DBLP:conf/eurocrypt/2008",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ booktitle = "EUROCRYPT",
+ year = 2008,
+ pages = "415--432",
+ ee = "http://dx.doi.org/10.1007/978-3-540-78967-3_24",
+ crossref = "DBLP:conf/eurocrypt/2008",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
-@Manual{IEEE:2000:1363,
- author = "{IEEE}",
- title = "IEEE 1363-2000: Standard Specifications for Public Key
+@Manual{ieee-2000:1363,
+ title = "IEEE 1363-2000: Standard Specifications for Public Key
Cryptography",
- year = 2000,
- isbn = "0-7381-1956-3",
- abstract = "This standard specifies common public-key cryptographic
+ author = "{IEEE}",
+ organization = "Microprocessor Standards Committee of the IEEE Computer
+ Society, USA",
+ year = 2000,
+ isbn = "0-7381-1956-3",
+ abstract = "This standard specifies common public-key cryptographic
techniques, including mathematical primitives for secret
value (key) derivation, public-key encryption, and digital
signatures, and cryptographic schemes based on those
parameters, public keys and private keys. The purpose of
this standard is to provide a reference for specifications
of a variety of techniques from which applications may
- select.",
- organization = "Microprocessor Standards Committee of the IEEE Computer
- Society, USA"
+ select."
}
-@Manual{IEEE:2004:1363a,
- title = "{IEEE} 1363a-2004: Standard Specifications for Public Key
+@Manual{ieee-2004:1363a,
+ title = "{IEEE} 1363a-2004: Standard Specifications for Public Key
Cryptography -- Amendment 1: Additional Techniques",
- author = "{IEEE}",
+ author = "{IEEE}",
organization = "Microprocessor Standards Committee of the IEEE Computer
Society, USA",
- year = 2004,
- note = "Amendment to \cite{IEEE:2000:1363}.",
- isbn = "0-7381-4003-1",
- abstract = "Amendment to IEEE Std 1363-2000. This standard specifies
- additional public-key cryptographic techniques beyond those
- in IEEE Std 1363-2000. It is intended to be merged with
- IEEE Std 1363-2000 during future revisions."
-}
-
-@PhdThesis{IWJ:1997:WGT,
- author = "Ian Jackson",
- title = "Who goes there? Location confidentiality through
+ year = 2004,
+ note = "Amendment to \cite{IEEE:2000:1363}.",
+ isbn = "0-7381-4003-1",
+ abstract = "Amendment to IEEE Std 1363-2000. This standard specifies
+ additional public-key cryptographic techniques beyond
+ those in IEEE Std 1363-2000. It is intended to be merged
+ with IEEE Std 1363-2000 during future revisions."
+}
+
+@PhdThesis{jackson-1997:who-goes-there,
+ author = "Ian Jackson",
+ title = "Who goes there? Location confidentiality through
anonymity",
- year = 1997,
- school = "Cambridge University Computer Laboratory",
- pages = "vi + 97",
- url = "http://www.chiark.greenend.org.uk/~ijackson/thesis/"
+ school = "Cambridge University Computer Laboratory",
+ year = 1997,
+ pages = "vi + 97",
+ url = "http://www.chiark.greenend.org.uk/~ijackson/thesis/"
}
-@Misc{Kohno:2003:CWC,
- author = "Tadayoshi Kohno and John Viega and Doug Whiting",
- title = "The CWC Authenticated Encryption (Associated Data) Mode",
+@TechReport{kocher-1996:ssl3,
+ author = "A. Frier and P. Karlton and P. Kocher",
+ title = "The {SSL 3.0} Protocol",
+ institution = "Netscape Communications Corp.",
+ year = 1996,
+ month = nov,
+ url = "http://home.netscape.com/eng/ssl3/ssl-toc.html"
+}
+
+@Misc{kohno-2003:cwc,
+ author = "Tadayoshi Kohno and John Viega and Doug Whiting",
+ title = "The CWC Authenticated Encryption (Associated Data) Mode",
howpublished = "Cryptology ePrint Archive, Report 2003/106",
- year = 2003,
- url = "http://eprint.iacr.org/2003/106"
+ year = 2003,
+ url = "http://eprint.iacr.org/2003/106"
}
-@InProceedings{Maurer:2009:UZK,
- author = "Ueli M. Maurer",
- title = "Unifying Zero-Knowledge Proofs of Knowledge",
- booktitle = "AFRICACRYPT",
- year = 2009,
- pages = "272-286",
- ee = "http://dx.doi.org/10.1007/978-3-642-02384-2_17",
- crossref = "DBLP:conf/africacrypt/2009",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+@InProceedings{maurer-2009:unify-proofs-of-knowledge,
+ author = "Ueli M. Maurer",
+ title = "Unifying Zero-Knowledge Proofs of Knowledge",
+ booktitle = "AFRICACRYPT",
+ year = 2009,
+ pages = "272-286",
+ ee = "http://dx.doi.org/10.1007/978-3-642-02384-2_17",
+ crossref = "DBLP:conf/africacrypt/2009",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
-@InProceedings{McGrew:2004:SPG,
- author = "David A. McGrew and John Viega",
- title = "The Security and Performance of the Galois/Counter Mode
+@InProceedings{mcgrew-viega-2004:gcm-security-performance,
+ author = "David A. McGrew and John Viega",
+ title = "The Security and Performance of the Galois/Counter Mode
({GCM}) of Operation",
- bibdate = "2004-12-13",
- bibsource = "DBLP,
- http://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2004.html#McGrewV04",
- booktitle = "Progress in Cryptology - {INDOCRYPT} 2004, 5th
+ booktitle = "Progress in Cryptology - {INDOCRYPT} 2004, 5th
International Conference on Cryptology in India, Chennai,
India, December 20-22, 2004, Proceedings",
- publisher = "Springer",
- year = 2004,
- volume = 3348,
- editor = "Anne Canteaut and Kapalee Viswanathan",
- isbn = "3-540-24130-2",
- pages = "343--355",
- series = "Lecture Notes in Computer Science",
- url = "http://eprint.iacr.org/2004/193"
-}
-
-@Misc{Menezes:2005:IPB,
- author = "Alfred Menezes",
- title = "An Introduction to Pairing-Based Cryptography",
- url =
- "http://www.cacr.math.uwaterloo.ca/~ajmeneze/publications/pairings.pdf",
- note = "Notes from lectures given in Santander, Spain",
- year = 2005
-}
-
-@InProceedings{Rogaway:2001:OCB,
- author = "Phillip Rogaway and Mihir Bellare and John Black and Ted
+ year = 2004,
+ editor = "Anne Canteaut and Kapalee Viswanathan",
+ volume = 3348,
+ series = "Lecture Notes in Computer Science",
+ pages = "343--355",
+ publisher = "Springer",
+ bibdate = "2004-12-13",
+ bibsource = "DBLP, http://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2004.html#McGrewV04",
+ isbn = "3-540-24130-2",
+ url = "http://eprint.iacr.org/2004/193"
+}
+
+@Misc{menezes-2005:intro-pairing-crypto,
+ author = "Alfred Menezes",
+ title = "An Introduction to Pairing-Based Cryptography",
+ year = 2005,
+ note = "Notes from lectures given in Santander, Spain",
+ url = "http://www.cacr.math.uwaterloo.ca/~ajmeneze/publications/pairings.pdf"
+}
+
+@Manual{nist-2005:cmac,
+ title = "Recommentation for Block Cipher Modes of Operation: The
+ {CMAC} Mode for Authentication",
+ author = "{NIST}",
+ organization = pub-NIST,
+ address = pub-NIST:adr,
+ month = may,
+ year = 2005,
+ volume = "SP~800-38\,B",
+ series = "Special Publications",
+ url = "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf"
+}
+
+@Manual{nist-2008:triple-des,
+ title = "Recommendation for the {Triple Data Encryption Algorithm}
+ ({TDEA}) Block Cipher",
+ author = "{NIST}",
+ organization = pub-NIST,
+ address = pub-NIST:adr,
+ month = may,
+ year = 2008,
+ volume = "SP~800-67",
+ pages = "x + 30",
+ day = 19,
+ series = "Special Publications",
+ url = "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
+ acknowledgement= ack-nhfb
+}
+
+@InProceedings{rogaway-2001:ocb,
+ author = "Phillip Rogaway and Mihir Bellare and John Black and Ted
Krovetz",
- title = "{OCB}: a block-cipher mode of operation for efficient
+ title = "{OCB}: a block-cipher mode of operation for efficient
authenticated encryption",
- booktitle = "{ACM} Conference on Computer and Communications Security",
- pages = "196--205",
- year = 2001,
- url = "http://www.cs.ucdavis.edu/~rogaway/ocb/"
-}
-
-@InProceedings{Rogaway:2002:AEA,
- author = "Phillip Rogaway",
- title = "Authenticated-encryption with associated-data",
- added-by = "msteiner",
- url = "http://www.cs.ucdavis.edu/~rogaway/papers/ad.html",
- pages = "98--107",
- added-at = "Sun Nov 16 12:50:24 2003",
- abstract = "When a message is transformed into a ciphertext in a way
+ booktitle = "{ACM} Conference on Computer and Communications Security",
+ year = 2001,
+ pages = "196--205",
+ url = "http://www.cs.ucdavis.edu/~rogaway/ocb/"
+}
+
+@InProceedings{rogaway-2002:aead,
+ author = "Phillip Rogaway",
+ title = "Authenticated-encryption with associated-data",
+ booktitle = "Proceedings of the 9th {ACM} Conference on Computer and
+ Communications Security",
+ year = 2002,
+ editor = "Ravi Sandhu",
+ pages = "98--107",
+ month = nov,
+ address = "Washington, DC, USA",
+ publisher = "ACM Press",
+ added-by = "msteiner",
+ url = "http://www.cs.ucdavis.edu/~rogaway/papers/ad.html",
+ added-at = "Sun Nov 16 12:50:24 2003",
+ abstract = "When a message is transformed into a ciphertext in a way
designed to protect both its privacy and authenticity,
there may be additional information, such as a packet
header, that travels alongside the ciphertext (at least
conceptually) and must get authenticated with it. We
formalize and investigate this authenticated-encryption
- with associated-data (AEAD) problem. Though the problem has
- long been addressed in cryptographic practice, it was never
- provided a definition or even a name. We do this, and go on
- to look at efficient solutions for AEAD, both in general
- and for the authenticated-encryption scheme OCB. For the
- general setting we study two simple ways to turn an
- authenticated-encryption scheme that does not support
- associated-data into one that does: nonce stealing and
- ciphertext translation. For the case of OCB we construct an
- AEAD-scheme by combining OCB and the pseudorandom function
- PMAC, using the same key for both algorithms. We prove
- that, despite ``interaction'' between the two schemes when
- using a common key, the combination is sound. We also
- consider achieving AEAD by the generic composition of a
- nonce-based, privacy-only encryption scheme and a
- pseudorandom function.",
- booktitle = "Proceedings of the 9th {ACM} Conference on Computer and
- Communications Security",
- year = 2002,
- editor = "Ravi Sandhu",
- month = nov,
- publisher = "ACM Press",
- address = "Washington, DC, USA"
-}
-
-@Misc{SEC1,
- author = "{Certicom Research}",
- title = "Standards for Efficient Cryptography, {SEC} 1: {E}lliptic
- curve cryptography, Version 1.0",
- year = 2000,
- url = "http://www.secg.org/download/aid-385/sec1_final.pdf"
-}
-
-@Manual{SP:2005:BCM,
- author = "{NIST}",
- title = "Recommentation for Block Cipher Modes of Operation: The
- {CMAC} Mode for Authentication",
- volume = "SP~800-38\,B",
- organization = pub-NIST,
- address = pub-NIST:adr,
- month = may,
- year = 2005,
- series = "Special Publications",
- url = "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf"
-}
-
-@Manual{SP:2008:TDEA,
- author = "{NIST}",
- title = "Recommendation for the {Triple Data Encryption Algorithm}
- ({TDEA}) Block Cipher",
- volume = "SP~800-67",
- organization = pub-NIST,
- address = pub-NIST:adr,
- pages = "x + 30",
- day = 19,
- month = may,
- year = 2008,
- series = "Special Publications",
- url = "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
- acknowledgement =ack-nhfb
-}
-
-@Unpublished{Shoup:2001:PIS,
- author = "Victor Shoup",
- title = "Proposal for an {ISO} Standard for Public Key Encryption
+ with associated-data (AEAD) problem. Though the problem
+ has long been addressed in cryptographic practice, it was
+ never provided a definition or even a name. We do this,
+ and go on to look at efficient solutions for AEAD, both in
+ general and for the authenticated-encryption scheme
+ OCB. For the general setting we study two simple ways to
+ turn an authenticated-encryption scheme that does not
+ support associated-data into one that does: nonce stealing
+ and ciphertext translation. For the case of OCB we
+ construct an AEAD-scheme by combining OCB and the
+ pseudorandom function PMAC, using the same key for both
+ algorithms. We prove that, despite ``interaction'' between
+ the two schemes when using a common key, the combination
+ is sound. We also consider achieving AEAD by the generic
+ composition of a nonce-based, privacy-only encryption
+ scheme and a pseudorandom function."
+}
+
+@Unpublished{shoup-2001:proposal-iso-public-key,
+ author = "Victor Shoup",
+ title = "Proposal for an {ISO} Standard for Public Key Encryption
(Version 2.0)",
- year = 2001,
- note = "Unpublished manuscript",
- url = "http://www.shoup.net/papers/"
+ note = "Unpublished manuscript",
+ year = 2001,
+ url = "http://www.shoup.net/papers/"
}
-@TechReport{Silverman:2000:CBA,
- author = "Robert Silverman",
- title = "A Cost-Based Security Analysis of Symmetric and Asymmetric
+@TechReport{silverman-2000:cost-based-security-analysis,
+ author = "Robert Silverman",
+ title = "A Cost-Based Security Analysis of Symmetric and Asymmetric
Key Lengths",
- institution = "RSA Laboratories",
- number = 13,
- month = "April",
- year = 2000,
- url = "http://www.rsa.com/rsalabs/node.asp?id=2088"
+ institution = "RSA Laboratories",
+ year = 2000,
+ number = 13,
+ month = "April",
+ url = "http://www.rsa.com/rsalabs/node.asp?id=2088"
}
-@Misc{Unicode:5.0,
- author = "Unicode Consortium",
- title = "The {Unicode} {Standard} 5.0",
- year = 2007,
- url = "http://www.unicode.org/versions/Unicode5.0.0/"
+@Misc{unicode-2007:standard,
+ author = "Unicode Consortium",
+ title = "The {Unicode} {Standard} 5.0",
+ year = 2007,
+ url = "http://www.unicode.org/versions/Unicode5.0.0/"
}
-@InProceedings{Wagner:2000:PSU,
- author = "David Wagner and Ian Goldberg",
- title = "Proofs of Security for the {Unix} Password Hashing
+@InProceedings{wagner-goldberg:unix-passwd-hashing,
+ author = "David Wagner and Ian Goldberg",
+ title = "Proofs of Security for the {Unix} Password Hashing
Algorithm",
- crossref = "Okamoto:2000:ACA",
- pages = "560--572",
- url = "http://www.cs.berkeley.edu/~daw/papers/"
-}
-
-@Book{Washington:2003:EC,
- author = "Lawrence C. Washington",
- title = "Elliptic Curves: Number Theory and Cryptography",
- isbn = "1-584-88365-0",
- publisher = "CRC Press",
- year = 2003,
- pages = 428
-}
-
-@TechReport {Wooding:2000:Storin,
- author = "Mark Wooding",
- title = "{Storin}: A block cipher for digitial signal processors",
- institution = "Straylight/Edgeware",
- year = 2000,
- url = "http://www.excessus.demon.co.uk/crypto/storin.ps.gz",
- abstract = "We present Storin: a new 96-bit block cipher designed to
+ pages = "560--572",
+ crossref = "Okamoto:2000:ACA",
+ url = "http://www.cs.berkeley.edu/~daw/papers/"
+}
+
+@Book{washington-2003:elliptic-curves,
+ author = "Lawrence C. Washington",
+ title = "Elliptic Curves: Number Theory and Cryptography",
+ publisher = "CRC Press",
+ year = 2003,
+ isbn = "1-584-88365-0",
+ pages = 428
+}
+
+@TechReport {wooding-2000:storin,
+ author = "Mark Wooding",
+ title = "{Storin}: A block cipher for digitial signal processors",
+ institution = "Straylight/Edgeware",
+ year = 2000,
+ url = "http://www.excessus.demon.co.uk/crypto/storin.ps.gz",
+ abstract = "We present Storin: a new 96-bit block cipher designed to
play to the strengths of current digital signal processors
(DSPs). In particular, DSPs tend to provide single-cycle
multiply-and-accumulate operations, making matrix
multiplications very cheap. Working in an environment
- where multiplication is as fast as exclusive-or changes the
- usual perceptions about which operations provide good
+ where multiplication is as fast as exclusive-or changes
+ the usual perceptions about which operations provide good
cryptographic strength cheaply. The scarcity of available
memory, for code and for tables, and a penalty for
nonsequential access to data also make traditional block
ciphers based around substitution tables unsuitable."
}
-@Misc{Wooding:2000:Storin-diff,
- author = "Mark Wooding",
- title = "Re: Yet another block cipher: {Storin}",
+@Misc{wooding-2000:storin-usenet,
+ author = "Mark Wooding",
+ title = "Re: Yet another block cipher: {Storin}",
howpublished = "Usenet article in \texttt{sci.crypt}",
- year = 2000,
- note = "Message-id {\msgid{<slrn8iqhaq.872.mdw@mull.ncipher.com>}}"
+ year = 2000,
+ note = "Message-id {\msgid{<slrn8iqhaq.872.mdw@mull.ncipher.com>}}"
}
-@Misc{Wooding:2001:TrIPE,
- author = "Mark Wooding",
- year = "2001--2010",
- url = "http://git.distorted.org.uk/~mdw/tripe/",
- title = "Trivial IP Encryption (TrIPE): A simple {VPN}"
+@Misc{wooding-2003:new-proofs-old-modes,
+ author = "Mark Wooding",
+ title = "New proofs for old modes",
+ howpublished = "Unpublished work in progress",
+ year = 2003
}
-@Misc{Wooding:2003:NPO,
- author = "Mark Wooding",
- title = "New proofs for old modes",
- howpublished = "Unpublished work in progress",
- year = 2003
+@Misc{wooding-2010:tripe,
+ author = "Mark Wooding",
+ title = "Trivial IP Encryption (TrIPE): A simple {VPN}",
+ year = "2001--2010",
+ url = "http://git.distorted.org.uk/~mdw/tripe/"
}
-@Misc{Ylonen:2001:STL,
- author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
+@Misc{ylonen-2001:ssh-transport-layer,
+ author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
S. Lehtinen",
- title = "{SSH} Transport Layer Protocol",
- month = jan,
- year = 2001,
+ title = "{SSH} Transport Layer Protocol",
howpublished = "Internet Draft",
- url = "http://www.ietf.org/internet-drafts/draft-ietf-secsh-transport-09.txt"
+ month = jan,
+ year = 2001,
+ url = "http://www.ietf.org/internet-drafts/draft-ietf-secsh-transport-09.txt"
}
%%%--------------------------------------------------------------------------
%%% Proceedings volumes.
@Proceedings{DBLP:conf/africacrypt/2009,
- editor = "Bart Preneel",
- title = "Progress in Cryptology - AFRICACRYPT 2009, Second
- International Conference on Cryptology in Africa, Gammarth,
- Tunisia, June 21-25, 2009. Proceedings",
- booktitle = "AFRICACRYPT",
- publisher = "Springer",
- series = "Lecture Notes in Computer Science",
- volume = 5580,
- year = 2009,
- isbn = "978-3-642-02383-5",
- ee = "http://dx.doi.org/10.1007/978-3-642-02384-2",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ title = "Progress in Cryptology - AFRICACRYPT 2009, Second
+ International Conference on Cryptology in Africa,
+ Gammarth, Tunisia, June 21-25, 2009. Proceedings",
+ year = 2009,
+ booktitle = "AFRICACRYPT",
+ editor = "Bart Preneel",
+ volume = 5580,
+ series = "Lecture Notes in Computer Science",
+ publisher = "Springer",
+ isbn = "978-3-642-02383-5",
+ ee = "http://dx.doi.org/10.1007/978-3-642-02384-2",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
@Proceedings{DBLP:conf/eurocrypt/2008,
- editor = "Nigel P. Smart",
- title = "Advances in Cryptology - EUROCRYPT 2008, 27th Annual
+ title = "Advances in Cryptology - EUROCRYPT 2008, 27th Annual
International Conference on the Theory and Applications of
Cryptographic Techniques, Istanbul, Turkey, April 13-17,
2008. Proceedings",
- booktitle = "EUROCRYPT",
- publisher = "Springer",
- series = "Lecture Notes in Computer Science",
- volume = 4965,
- year = 2008,
- isbn = "978-3-540-78966-6",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ year = 2008,
+ booktitle = "EUROCRYPT",
+ editor = "Nigel P. Smart",
+ volume = 4965,
+ series = "Lecture Notes in Computer Science",
+ publisher = "Springer",
+ isbn = "978-3-540-78966-6",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
@Proceedings{DBLP:conf/fse/2001,
- editor = "Mitsuru Matsui",
- title = "Fast Software Encryption, 8th International Workshop, FSE
+ title = "Fast Software Encryption, 8th International Workshop, FSE
2001 Yokohama, Japan, April 2-4, 2001, Revised Papers",
- booktitle = "FSE",
- publisher = "Springer",
- series = "Lecture Notes in Computer Science",
- volume = 2355,
- year = 2002,
- isbn = "3-540-43869-6",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ year = 2002,
+ booktitle = "FSE",
+ editor = "Mitsuru Matsui",
+ volume = 2355,
+ series = "Lecture Notes in Computer Science",
+ publisher = "Springer",
+ isbn = "3-540-43869-6",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
+}
+
+@Proceedings{DBLP:conf/fse/2005,
+ title = "Fast Software Encryption: 12th International Workshop,
+ {FSE} 2005, Paris, France, February 21-23, 2005, Revised
+ Selected Papers",
+ year = 2005,
+ editor = "Henri Gilbert and Helena Handschuh",
+ volume = 3557,
+ series = "Lecture Notes in Computer Science",
+ publisher = "Springer",
+ url = "https://doi.org/10.1007/b137506",
+ doi = "10.1007/b137506",
+ isbn = "3-540-26541-4",
+ timestamp = "Tue, 30 May 2017 16:36:53 +0200",
+ biburl = "http://dblp.uni-trier.de/rec/bib/conf/fse/2005",
+ bibsource = "dblp computer science bibliography, http://dblp.org"
}
@Proceedings{DBLP:conf/indocrypt/2004,
- editor = "Anne Canteaut and Kapalee Viswanathan",
- title = "Progress in Cryptology - INDOCRYPT 2004, 5th International
- Conference on Cryptology in India, Chennai, India, December
- 20-22, 2004, Proceedings",
- booktitle = "INDOCRYPT",
- publisher = "Springer",
- series = "Lecture Notes in Computer Science",
- volume = 3348,
- year = 2004,
- isbn = "3-540-24130-2",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ title = "Progress in Cryptology - INDOCRYPT 2004, 5th International
+ Conference on Cryptology in India, Chennai, India,
+ December 20-22, 2004, Proceedings",
+ year = 2004,
+ booktitle = "INDOCRYPT",
+ editor = "Anne Canteaut and Kapalee Viswanathan",
+ volume = 3348,
+ series = "Lecture Notes in Computer Science",
+ publisher = "Springer",
+ isbn = "3-540-24130-2",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
@Proceedings{DBLP:conf/pkc/2006,
- editor = "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
- Malkin",
- title = "Public Key Cryptography - {PKC} 2006, 9th International
+ title = "Public Key Cryptography - {PKC} 2006, 9th International
Conference on Theory and Practice of Public-Key
Cryptography, New York, NY, USA, April 24-26, 2006,
Proceedings",
- series = "Lecture Notes in Computer Science",
- volume = 3958,
- publisher = "Springer",
- year = 2006,
- url = "https://doi.org/10.1007/11745853",
- doi = "10.1007/11745853",
- isbn = "3-540-33851-9",
- timestamp = "Tue, 30 May 2017 16:36:52 +0200",
- biburl = "http://dblp.uni-trier.de/rec/bib/conf/pkc/2006",
- bibsource = "dblp computer science bibliography, http://dblp.org"
+ year = 2006,
+ editor = "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
+ Malkin",
+ volume = 3958,
+ series = "Lecture Notes in Computer Science",
+ publisher = "Springer",
+ url = "https://doi.org/10.1007/11745853",
+ doi = "10.1007/11745853",
+ isbn = "3-540-33851-9",
+ timestamp = "Tue, 30 May 2017 16:36:52 +0200",
+ biburl = "http://dblp.uni-trier.de/rec/bib/conf/pkc/2006",
+ bibsource = "dblp computer science bibliography, http://dblp.org"
}
@Proceedings{DBLP:conf/wpes/2004,
- editor = "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
+ title = "Proceedings of the 2004 ACM Workshop on Privacy in the
+ Electronic Society, WPES 2004, Washington, DC, USA,
+ October 28, 2004",
+ year = 2004,
+ booktitle = "WPES",
+ editor = "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
di Vimercati",
- title = "Proceedings of the 2004 ACM Workshop on Privacy in the
- Electronic Society, WPES 2004, Washington, DC, USA, October
- 28, 2004",
- booktitle = "WPES",
- publisher = "ACM",
- year = 2004,
- isbn = "1-58113-968-3",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ publisher = "ACM",
+ isbn = "1-58113-968-3",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
@Proceedings{DBLP:conf/wpes/2007,
- editor = "Peng Ning and Ting Yu",
- title = "Proceedings of the 2007 ACM Workshop on Privacy in the
- Electronic Society, WPES 2007, Alexandria, VA, USA, October
- 29, 2007",
- booktitle = "WPES",
- publisher = "ACM",
- year = 2007,
- isbn = "978-1-59593-883-1",
- bibsource = "DBLP, http://dblp.uni-trier.de"
+ title = "Proceedings of the 2007 ACM Workshop on Privacy in the
+ Electronic Society, WPES 2007, Alexandria, VA, USA,
+ October 29, 2007",
+ year = 2007,
+ booktitle = "WPES",
+ editor = "Peng Ning and Ting Yu",
+ publisher = "ACM",
+ isbn = "978-1-59593-883-1",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
}
%%%--------------------------------------------------------------------------