• Publications
  • Influence
Random oracles are practical: a paradigm for designing efficient protocols
TLDR
We argue that the random oracle model—where all parties have access to a public random oracles—provides a bridge between cryptographic theory and cryptographic practice. Expand
Entity Authentication and Key Distribution
TLDR
We provide the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment for the symmetric, two-party setting. Expand
Keying Hash Functions for Message Authentication
TLDR
We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Expand
HMAC: Keyed-Hashing for Message Authentication
TLDR
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions, in combination with a secret key. Expand
Authenticated Key Exchange Secure against Dictionary Attacks
TLDR
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. Expand
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
TLDR
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. Expand
Relations among Notions of Security for Public-Key Encryption Schemes
TLDR
We compare the relative strengths of popular notions of security for public key encryption schemes under chosen plaintext attack and two kinds of chosen ciphertext attack. Expand
DupLESS: Server-Aided Encryption for Deduplicated Storage
TLDR
We propose an architecture that provides secure deduplicated storage resisting brute-force attacks, and realize it in a system called DupLESS. Expand
OCB: a block-cipher mode of operation for efficient authenticated encryption
TLDR
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. Expand
A concrete security treatment of symmetric encryption
TLDR
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. Expand
...
1
2
3
4
5
...