Sign in
Author

Conference

Journal

Organization

Year

DOI
Look for results that meet for the following criteria:
since
equal to
before
between
and
Search in all fields of study
Limit my searches in the following fields of study
Agriculture Science
Arts & Humanities
Biology
Chemistry
Computer Science
Economics & Business
Engineering
Environmental Sciences
Geosciences
Material Science
Mathematics
Medicine
Physics
Social Science
Multidisciplinary
Keywords
(1)
Provable Security
Related Publications
(8)
A Concrete Security Treatment of Symmetric Encryption
Lecture Notes on Cryptography
The Exact Security of Digital Signatures  How to Sign with RSA and Rabin
Another Look at "Provable Security
Security and Composition of Multiparty Cryptographic Protocols
Subscribe
Academic
Publications
PracticeOriented ProvableSecurity
PracticeOriented ProvableSecurity,10.1007/354048969X_1,Mihir Bellare
Edit
PracticeOriented ProvableSecurity
(
Citations: 84
)
BibTex

RIS

RefWorks
Download
Mihir Bellare
This article is intended to provide some background and tellyou about the bigger picture.the plaintext M to create a ciphertext C, which is transmitted to the receiver. The latter applies
Conference:
Information Security Conference/Information Security Workshop  ISC(ISW)
, pp. 221231, 1997
DOI:
10.1007/354048969X_1
Cumulative
Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
(
www.springerlink.com
)
(
www.springerlink.com
)
(
www.springerlink.com
)
(
www.springerlink.com
)
More »
Citation Context
(56)
...On the one hand, he acknowledges that the search for suitable mathematical oneway functions — what he calls atomic primitives — has a large element of artistry [
6
]...
Ann Hibner Koblitz
,
et al.
Elliptic curve cryptography: The serpentine course of a paradigm shift
...Some important ideas such as probabilistic encryption, semantic security, indistinguishability [22], [23], random oracle model [24], and practiceoriented provable security [
25
] were suggested...
...These two attacks imply that when an algorithm is used in practice, other aspects should also be considered beyond the hard mathematical problem [22], [23], [24], [
25
]...
Xiaofeng Liao
,
et al.
On the Security of PublicKey Algorithms Based on Chebyshev Polynomial...
...Although the authors discuss the resiliency of the scheme against a couple of active attacks, they do not give a reductionist argument [
14
] against active adversaries...
Hassan Jameel
,
et al.
ImageFeature Based Human Identification Protocols on Limited Display ...
...parameters) have insufficient or unheeded “warning labels” [
B99
, Bi96, Be97, G98, MF00, McG02] expand view of blockcipher security beyond:  exhaustive key attacks (with TMTOs)  ordinary and generalized birthday collisions  differential cryptanalysis  linear cryptanalysis...
Virgil D. Gligor
.
The Fragility of Adversary Definitions in Cryptographic Protocols
...In addition, Bellare and Rogaway developed the notion of “practiceoriented provable security” (see [
3
])...
...From the standpoint of practice (as emphasized, for example, in [
3
]) this difference is important...
...The purported proof of Bellare and Rogaway in [7] was short and well written, and the result attracted much interest (and caused OAEP to be included in the SET electronic payment standard of MasterCard and Visa [
3
])...
...In order to arrive at a “practiceoriented” interpretation of the above result in the sense of [
3
], we have to examine the “tightness” of the reductionist security argument...
...In his useful and wonderfully written survey [
3
], Bellare draws a sharp distinction between two phases in the development of a cryptographic system: the design and study...
Neal Koblitz
,
et al.
Another Look at "Provable Security
References
(43)
MDxMAC and Building Fast MACs from Hash Functions
(
Citations: 100
)
Bart Preneell
,
Paul C. Van Oorschot
Conference:
International Crytology Conference  CRYPTO
, pp. 114, 1995
The Decision DiffieHellman Problem
(
Citations: 332
)
Dan Boneh
Conference:
Algorithmic Number Theory Symposium  ANTS
, vol. 1423, pp. 4863, 1998
How to construct random functions
(
Citations: 882
)
Oded Goldreich
,
Shafi Goldwasser
,
Silvio Micali
Journal:
Journal of The ACM  JACM
, vol. 33, no. 4, pp. 792807, 1986
A Concrete Security Treatment of Symmetric Encryption
(
Citations: 296
)
Mihir Bellare
,
Anand Desai
,
E. Jokipii
,
Phillip Rogaway
Conference:
IEEE Symposium on Foundations of Computer Science  FOCS
, pp. 394403, 1997
On the Importance of Checking Cryptographic Protocols for Faults
(
Citations: 383
)
Dan Boneh
,
Richard A. Demillo
,
Richard J. Lipton
Sort by:
Citations
(84)
Elliptic curve cryptography: The serpentine course of a paradigm shift
(
Citations: 6
)
Ann Hibner Koblitz
,
Neal Koblitz
,
Alfred Menezes
Journal:
Journal of Number Theory  J NUMBER THEOR
, vol. 131, no. 5, pp. 781814, 2011
A security framework for privacypreserving data aggregation in wireless sensor networks
Aldar C.F. Chan
,
Claude Castelluccia
Journal:
ACM Transactions on Sensor Networks  TOSN
, vol. 7, no. 4, pp. 145, 2011
On the Security of PublicKey Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$
(
Citations: 2
)
Xiaofeng Liao
,
Fei Chen
,
KwokWo Wong
Journal:
IEEE Transactions on Computers  TC
, vol. 59, no. 10, pp. 13921401, 2010
Providing freshness guarantees for outsourced databases
(
Citations: 8
)
Min Xie
,
Haixun Wang
,
Jian Yin
,
Xiaofeng Meng
Conference:
Extending Database Technology  EDBT
, pp. 323332, 2008
ImageFeature Based Human Identification Protocols on Limited Display Devices
(
Citations: 3
)
Hassan Jameel
,
Riaz Ahmed Shaikh
,
Le Xuan Hung
,
Yuan Wei Wei
,
Syed Muhammad Khaliqurrehman Raazi
,
Ngo Trong Canh
,
Sungyoung Lee
,
Heejo Lee
,
Yuseung Son
,
Miguel Fernandes
Conference:
Workshop on Information Security Applications  WISA
, pp. 211224, 2008