Academic
Publications
Practice-Oriented Provable-Security

Practice-Oriented Provable-Security,10.1007/3-540-48969-X_1,Mihir Bellare

Practice-Oriented Provable-Security   (Citations: 84)
BibTex | RIS | RefWorks Download
This article is intended to provide some background and tellyou about the bigger picture. the plaintext M to create a ciphertext C, which is transmitted to the receiver. The latter applies
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...On the one hand, he acknowledges that the search for suitable mathematical one-way functions — what he calls atomic primitives — has a large element of artistry [6]...

    Ann Hibner Koblitzet al. Elliptic curve cryptography: The serpentine course of a paradigm shift

    • ...Some important ideas such as probabilistic encryption, semantic security, indistinguishability [22], [23], random oracle model [24], and practice-oriented provable security [25] were suggested...
    • ...These two attacks imply that when an algorithm is used in practice, other aspects should also be considered beyond the hard mathematical problem [22], [23], [24], [25]...

    Xiaofeng Liaoet al. On the Security of Public-Key Algorithms Based on Chebyshev Polynomial...

    • ...Although the authors discuss the resiliency of the scheme against a couple of active attacks, they do not give a reductionist argument [14] against active adversaries...

    Hassan Jameelet al. Image-Feature Based Human Identification Protocols on Limited Display ...

    • ...parameters) -have insufficient or unheeded “warning labels” [B99, Bi96, Be97, G98, MF00, McG02] -expand view of block-cipher security beyond: - exhaustive key attacks (with TMTOs) - ordinary and generalized birthday collisions - differential cryptanalysis - linear cryptanalysis...

    Virgil D. Gligor. The Fragility of Adversary Definitions in Cryptographic Protocols

    • ...In addition, Bellare and Rogaway developed the notion of “practice-oriented provable security” (see [3])...
    • ...From the standpoint of practice (as emphasized, for example, in [3]) this difference is important...
    • ...The purported proof of Bellare and Rogaway in [7] was short and well written, and the result attracted much interest (and caused OAEP to be included in the SET electronic payment standard of MasterCard and Visa [3])...
    • ...In order to arrive at a “practice-oriented” interpretation of the above result in the sense of [3], we have to examine the “tightness” of the reductionist security argument...
    • ...In his useful and wonderfully written survey [3], Bellare draws a sharp distinction between two phases in the development of a cryptographic system: the design and study...

    Neal Koblitzet al. Another Look at "Provable Security

Sort by: