Corpus ID: 9957827

A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation

@inproceedings{Bellare1997ACS,
  title={A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation},
  author={M. Bellare and Anand Desai and E. Jokipii and P. Rogaway},
  booktitle={FOCS 1997},
  year={1997}
}
We study notions and schemes for symmetric (ie. [...] Key Method Next we provide concrete security analyses of methods to encrypt using a block cipher, including the most popular encryption method, CBC. We establish tight bounds (meaning matching upper bounds and attacks) on the success of adversaries as a function of their resources. Dept. of Computer Science & Engineering, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA 92093, USA. E-Mail: fmihir; adesai; ejg@cs.ucsd.edu. URL: http…Expand
Relations among Notions of Security for Public-Key Encryption Schemes
Practical homomorphic encryption over the integers for secure computation in the cloud
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin
Pubic Randomness in Cryptography
The Security of Cipher Block Chaining
Public-key cryptosystems provably secure against chosen ciphertext attacks
Pseudorandom functions revisited: the cascade construction and its concrete security
Security preserving amplification of hardness
...
1
2
3
...