• Publications
  • Influence
Relations among Notions of Security for Public-Key Encryption Schemes
TLDR
We compare the relative strengths of popular notions of security for public key encryption schemes under chosen plaintext attack and two kinds of chosen ciphertext attack. Expand
A concrete security treatment of symmetric encryption
TLDR
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. Expand
Key-Privacy in Public-Key Encryption
TLDR
We consider a novel security requirement of encryption schemes that we call "key-privacy" or "anonymity". Expand
A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation
TLDR
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. Expand
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
  • Anand Desai
  • Computer Science, Mathematics
  • CRYPTO
  • 20 August 2000
TLDR
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. Expand
A Practice-Oriented Treatment of Pseudorandom Number Generators
TLDR
We study Pseudorandom Number Generators (PRNGs) as used in practice, including the ANSI X9.17 and FIPS 186 PRNG. Expand
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
TLDR
We investigate several alternate characterizations of Pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) and show that it is possible to get better concrete security bounds for certain PRF/PRP-based schemes. Expand
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
TLDR
The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack try to make it infeasible for an attacker to forge "valid" ciphertexts. Expand
NAT-PT Security Considerations
...
1
2
...