Preview
Unable to display preview. Download preview PDF.
References
ANSI X9.9, “American National Standard for Financial Institution Message Authentication (Wholesale),rd American Bankers Association, 1981. Revised 1986.
ANSI X3.106, “American National Standard for Information Systems — Data Encryption Algorithm — Modes of Operation,” American National Standards Institute, 1983.
M. BELLARE, R. CANETTI AND H. KRAWCZYK, “Psuedorandom functions revisited: The cascade construction and its concrete security,” Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996.
M. BELLARE, A. DESAI, E. JOKIPII AND P. ROGAWAY, “A concrete security treatment of symmetric encryption,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
M. BELLARE, R. GUÉRIN AND P. ROGAWAY, “XOR “XOR New methods for message authentication using finite pseudorandom functions,” Advances in Cryptology — Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
M. BELLARE, J. KILIAN AND P. ROGAWAY, “The security of cipher block chaing“ Advances in Cryptology — Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
M. BELLARE AND P. ROGAWAY, “Entity authentication and key distributin,” Advances in Cryptology — Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, D. Stinson ed., Springer-Verlag, 1993.
M. BELLARE AND P. ROGAWAY, “Random oracles are practical: a paradigm for designing efficient protocols,” Proceedings of the First Annual Conference on Computer and Communications Security, ACM, 1993.
M. BELLARE AND P. ROGAWAY, “Optimal asymmetric encryption — How to encrypt with RSA,” Advances in Cryptology — Eurocrypt 95 Proceedings, Lecture Notes in Computer Science Vol. 921, L. Guillou and J. Quisquater ed., Springer-Verlag, 1995.
M. BELLARE AND P. ROGAWAY, “Provably secure session key the three party case,“ Proceedings of the 27th Annual Symposium on the Theory of Computing, ACM, 1995.
M. BELLARE AND P. ROGAWAY, “The exact security of digital signatures: How to sign with RSA and Rabin,” Advances in Cryptology-Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
M. BELLARE AND D. MICCIANCIO, “A new paradigm for collision-free hashing: Incrementality at reduced cost,” Advances in Cryptology — Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997.
M. Blum and S. Micali, “How to generate cryptographically strong sequences of pseudo-random bits,” SIAM Journal on Computing, Vol. 13, No. 4, November 1984, pp. 850–864.
H. DOBBERTIN, A. BOSSELAERS AND B. PRENEEL, “RIPEMD-160: A strengthened version of RIPEMD,” Fast Software Encryption, Lecture Notes in Computer Science 1039, D. Gollmann, ed., Springer-Verlag, 1996.
O. GOLDREICH, “On the foundations of modern ‘On Advances in Cryptology — Crypto 97 Proceedings, Lecture Notes in Computer Science Vol. 1294, B. Kaliski ed., Springer-Verlag, 1997.
O. Goldreich, S. Goldwasser and S. Micali, “How to construct random “How functions,” Journal of the ACM, Vol. 33, No. 4, October 1986, pp. 792–807.
S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Of Computer and System Sciences, Vol. 28, April 1984, pp. 270–299.
S. Goldwasser, S. Micali and R. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM Journal of Computing, Vol. 17, No. 2, April 1988, pp. 281–308.
ISO 8372, “Information processing — Modes of operation for a 64-bit block cipher algorithm,” International Organization for Standardization, Geneva, Switzerland, 1987.
M. LUBY AND C. RACKOFF, “How to construct pseudorandom permutations from pseudorandom functions,” SIAM J. Computation, Vol. 17, No. 2, April 1988.
National Bureau of Standards, NBS FIPS PUB 81, “DES modes of operation,” U.S Department of Commerce, 1980.
National Institute of Standards, FIPS 180-1, “Secure hash standar,” April 1995.
D. POINTCHEVAL AND J. STERN, “Security proofs for signatures,” Advances in Cryptology — Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
D. POINTCHEVAL AND J. STERN, “Provably secure blind signature schemes,” Advances in Cryptology — ASIACRYPT 96 Proceedings, Lecture Notes in Computer Science Vol. 1163, M. Y. Rhee and K. Kim ed., Springer-Verlag, 1996.
B. PRENEEL AND P. VAN OORSCHOT, “MD-x MAC and building fast MACS from hash functions,” Advances in Cryptology — Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
V. SHOUP AND A. RUBIN, “Session key distribution using smart cards,” Advances in Cryptology — Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
A. C. YAO, “Theory and applications of trapdoor functions,” Proceedings of the 23rd Symposium on Foundations of Computer Science, IEEE, 1982.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bellare, M. (1998). Practice-oriented provable-security. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030423
Download citation
DOI: https://doi.org/10.1007/BFb0030423
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64382-1
Online ISBN: 978-3-540-69767-1
eBook Packages: Springer Book Archive