Commit | Line | Data |
---|---|---|
d6cf9819 MW |
1 | |
2 | ||
3 | ,-------------------. | |
4 | | PREAMBLE | | |
5 | `-------------------' | |
6 | ||
7 | @preamble{ " \ifx\url\undefined\let\url\texttt\fi | |
8 | \ifx\msgid\undefined\let\msgid\texttt\fi | |
9 | \let\mdwxxthebibliography\thebibliography | |
10 | \def\thebibliography{\mdwxxbibhook\mdwxxthebibliography} | |
11 | \def\mdwxxurl#1{[#1]} | |
12 | \def\biburl#1{\let\biburlsep\empty\biburlxi#1;;\done} | |
13 | \def\biburlxi#1;{\def\temp{#1}\ifx\temp\empty\expandafter\biburlxiii\else | |
14 | \biburlxii#1,,\done\let\biburlxafter\biburlxi\expandafter\biburlxmunch\fi} | |
15 | \def\biburlxii#1,{\def\temp{#1}\ifx\temp\empty\expandafter\biburlxiii\else | |
16 | \biburlsep\mdwxxurl{#1}\def\biburlsep{, }\let\biburlxafter\biburlxii | |
17 | \expandafter\biburlxmunch\fi} \def\biburlxiii#1\done{} | |
18 | \def\biburlxmunch{\futurelet\next\biburlxmunchi} | |
19 | \def\biburlxmunchi{\expandafter\ifx\space\next\expandafter\biburlxmunchii | |
20 | \else\expandafter\biburlxafter\fi} | |
21 | \expandafter\def\expandafter\biburlxmunchii\space{\biburlxmunch} | |
22 | \def\mdwxxbibhook{\let\mdwxxurl\url\let\url\biburl} \ifx \k \undefined \let | |
23 | \k = \c \immediate\write16{Ogonek accent unavailable: replaced by cedilla} | |
24 | \fi\input bibnames.sty\input path.sty\ifx \undefined \mathrm \def \mathrm | |
25 | #1{{\rm #1}}\fi\hyphenation{ Cher-vo-nen-kis Eh-ren-feucht Hal-pern Jean-ette | |
26 | Kam-eda Leigh-ton Mehl-horn Metro-po-lis Pra-sad Prep-a-ra-ta Press-er | |
27 | Pros-ku-row-ski Ros-en-krantz Ru-dolph Schie-ber Schnei-der Te-zu-ka | |
28 | Vis-wa-na-than Yech-ez-kel Yech-i-ali data-base data-bases dead-lock | |
29 | poly-adic }\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi\hyphenation{ | |
30 | Ay-ka-nat Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li Reut-e-nau-er | |
31 | Thiel-sch-er }\ifx \undefined \mathbf \def \mathbf #1{{\bf #1}}\fi\ifx | |
32 | \undefined \TM \def \TM {${}^{\sc TM}$} \fi\hyphenation{ Ay-ka-nat | |
33 | Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li Reut-e-nau-er Thiel-sch-er | |
34 | }\ifx \undefined \eth \def \eth {{\font\ethfont = msbm10 \ethfont g}} \fi\ifx | |
35 | \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi\ifx \undefined \mathcal \def | |
36 | \mathcal #1{{\cal #1}}\fi\ifx \undefined \TM \def \TM {${}^{\sc TM}$} | |
37 | \fi\hyphenation{ Ay-ka-nat Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li | |
38 | Reut-e-nau-er Thiel-sch-er }\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} | |
39 | \fi\ifx \undefined \circled \def \circled #1{(#1)}\fi\ifx \undefined \mathbb | |
40 | \def \mathbb #1{{\bf #1}}\fi\ifx \undefined \mathbf \def \mathbf #1{{\bf | |
41 | #1}}\fi\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi\ifx \undefined | |
42 | \mathrm \def \mathrm #1{{\rm #1}}\fi\ifx \undefined \ocirc \def \ocirc | |
43 | #1{{\accent'27#1}}\fi\ifx \undefined \reg \def \reg {\circled{R}}\fi\ifx | |
44 | \undefined \TM \def \TM {${}^{\sc TM}$} \fi\hyphenation{ }\ifx \undefined | |
45 | \cprime \def \cprime {$\mathsurround=0pt '$}\fi\ifx \undefined \Dbar \def | |
46 | \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi\ifx \undefined | |
47 | \mathbb \def \mathbb #1{{\bf #1}}\fi\ifx \undefined \mathrm \def \mathrm | |
48 | #1{{\rm #1}}\fi\ifx \undefined \operatorname \def \operatorname #1{{\rm | |
49 | #1}}\fi\hyphenation{ Aba-di Arch-ives Ding-yi for-ge-ry Go-pa-la-krish-nan | |
50 | Hi-de-ki Kraw-czyk Lands-verk Law-rence Leigh-ton Mich-ael Moell-er | |
51 | North-ridge para-digm para-digms Piep-rzyk Piv-e-teau Ram-kilde | |
52 | Re-tro-fit-ting Rich-ard Sho-stak Si-ro-mo-n-ey Ste-ph-en The-o-dore Tho-m-as | |
53 | Tzone-lih venge-ance Will-iam Ye-sh-i-va }\ifx \undefined \bbb \def \bbb | |
54 | #1{\mathbb{#1}} \fi\ifx \undefined \circled \def \circled #1{(#1)}\fi\ifx | |
55 | \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi\ifx \undefined | |
56 | \mathbb \def \mathbb #1{{\bf #1}}\fi\ifx \undefined \mathrm \def \mathrm | |
57 | #1{{\rm #1}}\fi\ifx \undefined \reg \def \reg {\circled{R}}\fi\ifx \undefined | |
58 | \TM \def \TM {${}^{\sc TM}$} \fi\hyphenation{ Aba-di Arch-ives Ding-yi | |
59 | for-ge-ry Go-pa-la-krish-nan Hi-de-ki Kraw-czyk Lands-verk Law-rence | |
60 | Leigh-ton Mich-ael Moell-er North-ridge para-digm para-digms Piep-rzyk | |
61 | Piv-e-teau Ram-kilde Re-tro-fit-ting Rich-ard Sho-stak Si-ro-mo-n-ey | |
62 | Ste-ph-en The-o-dore Tho-m-as Tzone-lih venge-ance Will-iam Ye-sh-i-va }\ifx | |
63 | \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi\ifx \undefined \cprime \def | |
64 | \cprime {$\mathsurround=0pt '$}\fi\ifx \undefined \mathbb \def \mathbb | |
65 | #1{{\bf #1}}\fi\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi\ifx | |
66 | \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi\hyphenation{ }\ifx \undefined | |
67 | \cprime \def \cprime {$\mathsurround=0pt '$}\fi\ifx \undefined \Dbar \def | |
68 | \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi\ifx \undefined | |
69 | \mathbb \def \mathbb #1{{\bf #1}}\fi\ifx \undefined \mathrm \def \mathrm | |
70 | #1{{\rm #1}}\fi\ifx \undefined \operatorname \def \operatorname #1{{\rm | |
71 | #1}}\fi\hyphenation{ Aba-di Arch-ives Ding-yi for-ge-ry Go-pa-la-krish-nan | |
72 | Hi-de-ki Kraw-czyk Lands-verk Law-rence Leigh-ton Mich-ael Moell-er | |
73 | North-ridge para-digm para-digms Piep-rzyk Piv-e-teau Ram-kilde | |
74 | Re-tro-fit-ting Rich-ard Sho-stak Si-ro-mo-n-ey Ste-ph-en The-o-dore Tho-m-as | |
75 | Tzone-lih venge-ance Will-iam Ye-sh-i-va }" | |
76 | } | |
77 | ||
78 | ,-------------------. | |
79 | | BIBTEX ENTRIES | | |
80 | `-------------------' | |
81 | ||
82 | @misc{cryptoeprint:2006:337, | |
83 | author = {D.R. Stinson and J. Wu}, | |
84 | howpublished = {Cryptology ePrint Archive, Report 2006/337}, | |
85 | title = {An Efficient and Secure Two-flow Zero-Knowledge | |
86 | Identification Protocol}, | |
87 | year = {2006}, | |
88 | url = {http://eprint.iacr.org/2006/337}, | |
89 | } | |
90 | ||
91 | @misc{cryptoeprint:1999:012, | |
92 | author = {Victor Shoup}, | |
93 | howpublished = {Cryptology ePrint Archive, Report 1999/012}, | |
94 | title = {On Formal Models for Secure Key Exchange}, | |
95 | year = {1999}, | |
96 | url = {http://eprint.iacr.org/1999/012}, | |
97 | } | |
98 | ||
99 | @misc{cryptoeprint:2006:229, | |
100 | author = {Neal Koblitz and Alfred Menezes}, | |
101 | howpublished = {Cryptology ePrint Archive, Report 2006/229}, | |
102 | title = {Another Look at "Provable Security". II}, | |
103 | year = {2006}, | |
104 | url = {http://eprint.iacr.org/2006/229}, | |
105 | } | |
106 | ||
107 | @inproceedings{Bellare:1994:SCB, | |
108 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
109 | etc.}, | |
110 | author = {Mihir Bellare and Joe Kilian and Phillip Rogaway}, | |
111 | booktitle = {{Advances in cryptology, {CRYPTO '94}: 14th annual | |
112 | international cryptology conference, Santa Barbara, | |
113 | California, {USA}, August 21--25, 1994: proceedings}}, | |
114 | editor = {Yvo G. Desmedt}, | |
115 | pages = {341--358}, | |
116 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
117 | series = {Lecture Notes in Computer Science}, | |
118 | title = {The Security of Cipher Block Chaining}, | |
119 | volume = {839}, | |
120 | year = {1994}, | |
121 | doi = {????}, | |
122 | isbn = {3-540-58333-5 (Berlin), 0-387-58333-5 (New York)}, | |
123 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
124 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
125 | 0839/08390341.htm; http://link.springer-ny.com/link/service/ | |
126 | series/0558/papers/0839/08390341.pdf}, | |
127 | } | |
128 | ||
129 | @inproceedings{Bellare:1995:XMN, | |
130 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
131 | etc.}, | |
132 | author = {Mihir Bellare and Roch Gu{\'e}rin and | |
133 | Phillip Rogaway}, | |
134 | booktitle = {{Advances in cryptology, {CRYPTO '95}: 15th Annual | |
135 | International Cryptology Conference, Santa Barbara, | |
136 | California, {USA}, August 27--31, 1995: proceedings}}, | |
137 | editor = {Don Coppersmith}, | |
138 | note = {Sponsored by the International Association for | |
139 | Cryptologic Research (IACR), in cooperation with the | |
140 | IEEE Computer Society Technical Committee on Security | |
141 | and Privacy.}, | |
142 | pages = {15--35}, | |
143 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
144 | series = {Lecture Notes in Computer Science}, | |
145 | title = {{XOR MACs}: New methods for message authentication | |
146 | using finite pseudorandom functions}, | |
147 | volume = {963}, | |
148 | year = {1995}, | |
149 | doi = {????}, | |
150 | isbn = {3-540-60221-6 (Berlin)}, | |
151 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
152 | url = {http://link.springer-ny.com/link/service/series/0558/tocs/ | |
153 | t0963.htm; http://www.springerlink.com/openurl.asp? | |
154 | genre=issue&issn=0302-9743&volume=963}, | |
155 | } | |
156 | ||
157 | @inproceedings{Bellare:1995:OAE, | |
158 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
159 | etc.}, | |
160 | author = {M. Bellare and P. Rogaway}, | |
161 | booktitle = {Advances in cryptology --- {EUROCRYPT} '94: Workshop | |
162 | on the Theory and Application of Cryptographic | |
163 | Techniques, Perugia, Italy, May 9--12, 1994: | |
164 | proceedings}, | |
165 | editor = {Alfredo {De Santis}}, | |
166 | pages = {92--111}, | |
167 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
168 | series = {Lecture Notes in Computer Science}, | |
169 | title = {Optimal asymmetric encryption}, | |
170 | volume = {950}, | |
171 | year = {1995}, | |
172 | isbn = {3-540-60176-7}, | |
173 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
174 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
175 | 0950/09500092.htm; http://link.springer-ny.com/link/service/ | |
176 | series/0558/papers/0950/09500092.pdf}, | |
177 | } | |
178 | ||
179 | @article{Bellare:1996:ESD, | |
180 | author = {Mihir Bellare and Phillip Rogaway}, | |
181 | journal = {Lecture Notes in Computer Science}, | |
182 | pages = {399--??}, | |
183 | title = {The exact security of digital signatures --- how to | |
184 | sign with {RSA} and {Rabin}}, | |
185 | volume = {1070}, | |
186 | year = {1996}, | |
187 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
188 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
189 | 1070/10700399.htm; http://link.springer-ny.com/link/service/ | |
190 | series/0558/papers/1070/10700399.pdf}, | |
191 | } | |
192 | ||
193 | @inproceedings{Bellare:1996:KHF, | |
194 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
195 | etc.}, | |
196 | author = {Mihir Bellare and Ran Canetti and Hugo Krawczyk}, | |
197 | booktitle = {{Advances in cryptology, {CRYPTO '96}: 16th annual | |
198 | international cryptology conference, Santa Barbara, | |
199 | California, {USA}, August 18--22, 1996: proceedings}}, | |
200 | editor = {Neal Koblitz}, | |
201 | note = {Sponsored by the International Association for | |
202 | Cryptologic Research (IACR), in cooperation with the | |
203 | IEEE Computer Society Technical Committee on Security | |
204 | and Privacy and the Computer Science Department of | |
205 | the University of California at Santa Barbara | |
206 | (UCSB).}, | |
207 | pages = {1--15}, | |
208 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
209 | series = {Lecture Notes in Computer Science}, | |
210 | title = {Keying Hash Functions for Message Authentication}, | |
211 | volume = {1109}, | |
212 | year = {1996}, | |
213 | annote = {``Sponsored by the International Association for | |
214 | Cryptologic Research (IACR), in cooperation with the | |
215 | IEEE Computer Society Technical Committee on Security | |
216 | and Privacy and the Computer Science Department of | |
217 | the University of California at Santa Barbara | |
218 | (UCSB)''}, | |
219 | doi = {????}, | |
220 | isbn = {3-540-61512-1}, | |
221 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
222 | url = {Full version: http://www.research.ibm.com/security/; http:// | |
223 | link.springer-ny.com/link/service/series/0558/bibs/1109/ | |
224 | 11090001.htm; http://link.springer-ny.com/link/service/ | |
225 | series/0558/papers/1109/11090001.pdf}, | |
226 | } | |
227 | ||
228 | @inproceedings{Bellare:1997:CST, | |
229 | address = {1109 Spring Street, Suite 300, Silver Spring, MD | |
230 | 20910, USA}, | |
231 | author = {M. Bellare and A. Desai and E. Jokipii and | |
232 | P. Rogaway}, | |
233 | booktitle = {38th Annual Symposium on Foundations of Computer | |
234 | Science: October 20--22, 1997, Miami Beach, Florida}, | |
235 | editor = {{IEEE}}, | |
236 | note = {IEEE catalog number 97CB36150. IEEE Computer Society | |
237 | Press order number PR08197.}, | |
238 | pages = {394--403}, | |
239 | publisher = {IEEE Computer Society Press}, | |
240 | title = {A concrete security treatment of symmetric | |
241 | encryption}, | |
242 | year = {1997}, | |
243 | isbn = {0-8186-8197-7, 0-8186-8198-5 (casebound), | |
244 | 0-8186-8199-3 (microfiche)}, | |
245 | issn = {0272-5428}, | |
246 | } | |
247 | ||
248 | @article{Bellare:1999:POP, | |
249 | author = {M. Bellare}, | |
250 | journal = {Lecture Notes in Computer Science}, | |
251 | pages = {1--15}, | |
252 | title = {Practice-Oriented Provable Security}, | |
253 | volume = {1561}, | |
254 | year = {1999}, | |
255 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
256 | } | |
257 | ||
258 | @techreport{Burrows:1989:LAa, | |
259 | author = {Michael Burrows and Martin Abadi and Roger Needham}, | |
260 | institution = {Digital Equipment Corporation, Systems Research | |
261 | Centre}, | |
262 | month = feb, | |
263 | number = {39}, | |
264 | pages = {48}, | |
265 | title = {A Logic of Authentication}, | |
266 | year = {1989}, | |
267 | abstract = {Questions of belief are essential in analyzing | |
268 | protocols for authentication in distributed computing | |
269 | systems. In this paper we motivate, set out, and | |
270 | exemplify a logic specifically designed for this | |
271 | analysis; we show how various protocols differ subtly | |
272 | with respect to the required initial assumptions of | |
273 | the participants and their final beliefs. Our | |
274 | formalism has enabled us to isolate and express these | |
275 | differences with a precision that was not previously | |
276 | possible. It has drawn attention to features of | |
277 | protocols of which we and their authors were | |
278 | previously unaware, and allowed us to suggest | |
279 | improvements to the protocols. The reasoning about | |
280 | some protocols has been mechanically verified. This | |
281 | paper starts with an informal account of the problem, | |
282 | goes on to explain the formalism to be used, and | |
283 | gives examples of its application to protocols from | |
284 | the literature, both with conventional shared-key | |
285 | cryptography and with public-key cryptography. Some | |
286 | of the examples are chosen because of their practical | |
287 | importance, while others serve to illustrate subtle | |
288 | points of the logic and to explain how we use it. We | |
289 | discuss extensions of the logic motivated by actual | |
290 | practice -- for example, in order to account for the | |
291 | use of hash functions in signatures. The final | |
292 | sections contain a formal semantics of the logic and | |
293 | some conclusions.}, | |
294 | } | |
295 | ||
296 | @inproceedings{Bellare:1994:EAK, | |
297 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
298 | etc.}, | |
299 | author = {Mihir Bellare and Phillip Rogaway}, | |
300 | booktitle = {{Advances in cryptology, {CRYPTO '94}: 14th annual | |
301 | international cryptology conference, Santa Barbara, | |
302 | California, {USA}, August 21--25, 1994: proceedings}}, | |
303 | editor = {Yvo G. Desmedt}, | |
304 | pages = {232--249}, | |
305 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
306 | series = {Lecture Notes in Computer Science}, | |
307 | title = {Entity Authentication and Key Distribution}, | |
308 | volume = {839}, | |
309 | year = {1994}, | |
310 | doi = {????}, | |
311 | isbn = {3-540-58333-5 (Berlin), 0-387-58333-5 (New York)}, | |
312 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
313 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
314 | 0773/07730232.htm; http://link.springer-ny.com/link/service/ | |
315 | series/0558/papers/0773/07730232.pdf}, | |
316 | } | |
317 | ||
318 | @inproceedings{Bellare:1995:PSS, | |
319 | address = {New York, NY, USA}, | |
320 | author = {Mihir Bellare and Phillip Rogaway}, | |
321 | booktitle = {Proceedings of the twenty-seventh annual {ACM} | |
322 | Symposium on Theory of Computing: Las Vegas, Nevada, | |
323 | May 29--June 1, 1995}, | |
324 | editor = {{ACM}}, | |
325 | note = {ACM order no. 508950.}, | |
326 | pages = {57--66}, | |
327 | publisher = {ACM Press}, | |
328 | title = {Provably secure session key distribution: the three | |
329 | party case}, | |
330 | year = {1995}, | |
331 | isbn = {0-89791-718-9}, | |
332 | url = {http://www.acm.org/pubs/citations/proceedings/stoc/225058/ | |
333 | p57-bellare/; http://www.acm.org/pubs/articles/proceedings/ | |
334 | stoc/225058/p57-bellare/p57-bellare.pdf}, | |
335 | } | |
336 | ||
337 | @article{Blake-Wilson:1997:KAP, | |
338 | author = {S. Blake-Wilson and D. Johnson and A. Menezes}, | |
339 | journal = {Lecture Notes in Computer Science}, | |
340 | pages = {30--??}, | |
341 | title = {Key Agreement Protocols and Their Security Analysis}, | |
342 | volume = {1355}, | |
343 | year = {1997}, | |
344 | issn = {0302-9743}, | |
345 | } | |
346 | ||
347 | @article{Blake-Wilson:1998:EAA, | |
348 | author = {S. Blake-Wilson and A. Menezes}, | |
349 | journal = {Lecture Notes in Computer Science}, | |
350 | pages = {137--??}, | |
351 | title = {Entity Authentication and Authenticated Key Transport | |
352 | Protocols Employing Asymmetric Techniques}, | |
353 | volume = {1361}, | |
354 | year = {1998}, | |
355 | issn = {0302-9743}, | |
356 | } | |
357 | ||
358 | @inproceedings{Bellare:1998:MAD, | |
359 | address = {New York, NY, USA}, | |
360 | author = {Mihir Bellare and Ran Canetti and Hugo Krawczyk}, | |
361 | booktitle = {Proceedings of the thirtieth annual {ACM} Symposium | |
362 | on Theory of Computing: Dallas, Texas, May 23--26, | |
363 | 1998}, | |
364 | editor = {{ACM}}, | |
365 | note = {ACM order number 508980.}, | |
366 | pages = {419--428}, | |
367 | publisher = {ACM Press}, | |
368 | title = {A modular approach to the design and analysis of | |
369 | authentication and key exchange protocols (extended | |
370 | abstract)}, | |
371 | year = {1998}, | |
372 | isbn = {0-89791-962-9}, | |
373 | url = {http://www.acm.org/pubs/citations/proceedings/stoc/276698/ | |
374 | p419-bellare/; http://www.acm.org/pubs/articles/proceedings/ | |
375 | stoc/276698/p419-bellare/p419-bellare.pdf}, | |
376 | } | |
377 | ||
378 | @misc{cryptoeprint:2001:040, | |
379 | author = {Ran Canetti and Hugo Krawczyk}, | |
380 | howpublished = {Cryptology ePrint Archive, Report 2001/040}, | |
381 | title = {Analysis of Key-Exchange Protocols and Their Use for | |
382 | Building Secure Channels}, | |
383 | year = {2001}, | |
384 | url = {http://eprint.iacr.org/2001/040}, | |
385 | } | |
386 | ||
387 | @article{Canetti:2001:AKE, | |
388 | author = {Ran Canetti and Hugo Krawczyk}, | |
389 | journal = {Lecture Notes in Computer Science}, | |
390 | pages = {453--??}, | |
391 | title = {Analysis of Key-Exchange Protocols and Their Use for | |
392 | Building Secure Channels}, | |
393 | volume = {2045}, | |
394 | year = {2001}, | |
395 | issn = {0302-9743}, | |
396 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
397 | 2045/20450453.htm; http://link.springer-ny.com/link/service/ | |
398 | series/0558/papers/2045/20450453.pdf}, | |
399 | } | |
400 | ||
401 | @techreport{Canetti:2001:UCS, | |
402 | author = {Ran Canetti}, | |
403 | institution = {Cryptology {ePrint} Archive}, | |
404 | month = oct, | |
405 | note = {Extended Abstract appeared in proceedings of the 42nd | |
406 | Symposium on Foundations of Computer Science (FOCS), | |
407 | 2001}, | |
408 | number = {2000/067}, | |
409 | type = {Report}, | |
410 | title = {Universally Composable Security: {A} New Paradigm for | |
411 | Cryptographic Protocols}, | |
412 | year = {2001}, | |
413 | abstract = {We propose a new paradigm for defining security of | |
414 | cryptographic protocols, called {\sf universally | |
415 | composable security.} The salient property of | |
416 | universally composable definitions of security is | |
417 | that they guarantee security even when a secure | |
418 | protocol is composed with an arbitrary set of | |
419 | protocols, or more generally when the protocol is | |
420 | used as a component of an arbitrary system. This is | |
421 | an essential property for maintaining security of | |
422 | cryptographic protocols in complex and unpredictable | |
423 | environments such as the Internet. In particular, | |
424 | universally composable definitions guarantee security | |
425 | even when an unbounded number of protocol instances | |
426 | are executed concurrently in an adversarially | |
427 | controlled manner, they guarantee non-malleability | |
428 | with respect to arbitrary protocols, and more. We | |
429 | show how to formulate universally composable | |
430 | definitions of security for practically any | |
431 | cryptographic task. Furthermore, we demonstrate that | |
432 | practically any such definition can be realized using | |
433 | known general techniques, as long as only a minority | |
434 | of the participants are corrupted. We then proceed to | |
435 | formulate universally composable definitions of a | |
436 | wide array of cryptographic tasks, including | |
437 | authenticated and secure communication, key-exchange, | |
438 | public-key encryption, signature, commitment, | |
439 | oblivious transfer, zero-knowledge, and more. We also | |
440 | make initial steps towards studying the realizability | |
441 | of the proposed definitions in other natural | |
442 | settings.}, | |
443 | annote = {Revised version of \cite{Canetti:2000:SCM}.}, | |
444 | url = {http://eprint.iacr.org/2000/067}, | |
445 | } | |
446 | ||
447 | @article{Canetti:2002:UCN, | |
448 | author = {Ran Canetti and Hugo Krawczyk}, | |
449 | journal = {Lecture Notes in Computer Science}, | |
450 | pages = {337--??}, | |
451 | title = {Universally Composable Notions of Key Exchange and | |
452 | Secure Channels}, | |
453 | volume = {2332}, | |
454 | year = {2002}, | |
455 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
456 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
457 | 2332/23320337.htm; http://link.springer-ny.com/link/service/ | |
458 | series/0558/papers/2332/23320337.pdf}, | |
459 | } | |
460 | ||
461 | @misc{cryptoeprint:2004:332, | |
462 | author = {Victor Shoup}, | |
463 | howpublished = {Cryptology ePrint Archive, Report 2004/332}, | |
464 | title = {Sequences of games: a tool for taming complexity in | |
465 | security proofs}, | |
466 | year = {2004}, | |
467 | url = {http://eprint.iacr.org/2004/332}, | |
468 | } | |
469 | ||
470 | @misc{cryptoeprint:2004:331, | |
471 | author = {Mihir Bellare and Phillip Rogaway}, | |
472 | howpublished = {Cryptology ePrint Archive, Report 2004/331}, | |
473 | title = {Code-Based Game-Playing Proofs and the Security of | |
474 | Triple Encryption}, | |
475 | year = {2004}, | |
476 | url = {http://eprint.iacr.org/2004/331}, | |
477 | } | |
478 | ||
479 | @inproceedings{Shoup:2001:OR, | |
480 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
481 | etc.}, | |
482 | author = {Victor Shoup}, | |
483 | booktitle = {Advances in cryptology --- {CRYPTO} 2001: 21st Annual | |
484 | International Cryptology Conference, Santa Barbara, | |
485 | California, {USA}, August 19--23, 2001: proceedings}, | |
486 | editor = {Joe Kilian}, | |
487 | pages = {239--??}, | |
488 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
489 | series = {Lecture Notes in Computer Science}, | |
490 | title = {{OAEP} Reconsidered}, | |
491 | volume = {2139}, | |
492 | year = {2001}, | |
493 | isbn = {3-540-42456-3 (paperback)}, | |
494 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
495 | 2139/21390239.htm; http://link.springer-ny.com/link/service/ | |
496 | series/0558/papers/2139/21390239.pdf}, | |
497 | } | |
498 | ||
499 | @inproceedings{Bellare:1993:ROP, | |
500 | author = {Mihir Bellare and Phillip Rogaway}, | |
501 | booktitle = {Proceedings of the First Annual Conference on | |
502 | Computer and Communications Security}, | |
503 | organization = {{ACM}}, | |
504 | pages = {62--73}, | |
505 | title = {Random oracles are practical}, | |
506 | year = {1993}, | |
507 | url = {http://www-cse.ucsd.edu/users/mihir/papers/ro.html}, | |
508 | } | |
509 | ||
510 | @article{Canetti:2004:ROM, | |
511 | author = {Ran Canetti and Oded Goldreich and Shai Halevi}, | |
512 | journal = {Journal of the ACM}, | |
513 | month = jul, | |
514 | number = {4}, | |
515 | pages = {557--594}, | |
516 | title = {The random oracle methodology, revisited}, | |
517 | volume = {51}, | |
518 | year = {2004}, | |
519 | issn = {0004-5411 (print), 1557-735X (electronic)}, | |
520 | } | |
521 | ||
522 | @article{Boneh:2003:IBE, | |
523 | author = {Dan Boneh and Matthew Franklin}, | |
524 | journal = {SIAM Journal on Computing}, | |
525 | month = jun, | |
526 | number = {3}, | |
527 | pages = {586--615}, | |
528 | title = {Identity-Based Encryption from the {Weil} Pairing}, | |
529 | volume = {32}, | |
530 | year = {2003}, | |
531 | doi = {http://dx.doi.org/10.1137/S0097539701398521}, | |
532 | issn = {0097-5397 (print), 1095-7111 (electronic)}, | |
533 | url = {http://epubs.siam.org/sam-bin/dbq/article/39852}, | |
534 | } | |
535 | ||
536 | @article{Shoup:1997:LBD, | |
537 | author = {Victor Shoup}, | |
538 | journal = {Lecture Notes in Computer Science}, | |
539 | pages = {256--??}, | |
540 | title = {Lower Bounds for Discrete Logarithms and Related | |
541 | Problems}, | |
542 | volume = {1233}, | |
543 | year = {1997}, | |
544 | issn = {0302-9743}, | |
545 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
546 | 1233/12330256.htm; http://link.springer-ny.com/link/service/ | |
547 | series/0558/papers/1233/12330256.pdf}, | |
548 | } | |
549 | ||
550 | @article{Boneh:1998:DDP, | |
551 | author = {D. Boneh}, | |
552 | journal = {Lecture Notes in Computer Science}, | |
553 | pages = {48--63}, | |
554 | title = {The Decision {Diffie--Hellman} Problem}, | |
555 | volume = {1423}, | |
556 | year = {1998}, | |
557 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
558 | url = {http://theory.stanford.edu/~dabo/papers/DDH.ps.gz}, | |
559 | } | |
560 | ||
561 | @article{Bellare:1998:RAN, | |
562 | author = {Mihir Bellare and Anand Desai and David Pointcheval and | |
563 | Phillip Rogaway}, | |
564 | journal = {Lecture Notes in Computer Science}, | |
565 | pages = {26--??}, | |
566 | title = {Relations Among Notions of Security for Public-Key | |
567 | Encryption Schemes}, | |
568 | volume = {1462}, | |
569 | year = {1998}, | |
570 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
571 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
572 | 1462/14620026.htm; http://link.springer-ny.com/link/service/ | |
573 | series/0558/papers/1462/14620026.pdf}, | |
574 | } | |
575 | ||
576 | @inproceedings{ElGamal:1985:PKCb, | |
577 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
578 | etc.}, | |
579 | author = {Taher ElGamal}, | |
580 | booktitle = {{Advances in Cryptology: Proceedings of CRYPTO 84}}, | |
581 | editor = {George Robert Blakley and David Chaum}, | |
582 | note = {CRYPTO 84: a Workshop on the Theory and Application | |
583 | of Cryptographic Techniques, held at the University | |
584 | of California, Santa Barbara, August 19--22, 1984, | |
585 | sponsored by the International Association for | |
586 | Cryptologic Research.}, | |
587 | pages = {10--18}, | |
588 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
589 | series = {Lecture Notes in Computer Science}, | |
590 | title = {A Public Key Cryptosystem and a Signature Scheme | |
591 | Based on Discrete Logarithms}, | |
592 | volume = {196}, | |
593 | year = {1985}, | |
594 | doi = {http://dx.doi.org/10.1007/3-540-39568-7}, | |
595 | isbn = {0-387-15658-5; 3-540-39568-7}, | |
596 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
597 | url = {http://www.springerlink.com/openurl.asp?genre=article&issn=? | |
598 | ???&volume=0&issue=0&spage=10}, | |
599 | } | |
600 | ||
601 | @misc{Menezes:2005:IPB, | |
602 | author = {Alfred Menezes}, | |
603 | note = {Notes from lectures given in Santander, Spain}, | |
604 | title = {An Introduction to Pairing-Based Cryptography}, | |
605 | year = {2005}, | |
606 | url = {http://www.cacr.math.uwaterloo.ca/~ajmeneze/publications/ | |
607 | pairings.pdf}, | |
608 | } | |
609 | ||
610 | @book{Schneier:1996:ACP, | |
611 | address = {New York, NY, USA}, | |
612 | author = {Bruce Schneier}, | |
613 | edition = {Second}, | |
614 | pages = {xxiii + 758}, | |
615 | publisher = {John Wiley and Sons, Inc.}, | |
616 | title = {Applied Cryptography: Protocols, Algorithms, and | |
617 | Source Code in {C}}, | |
618 | year = {1996}, | |
619 | isbn = {0-471-12845-7 (cloth), 0-471-11709-9 (paper)}, | |
620 | url = {http://www.counterpane.com/applied.html}, | |
621 | } | |
622 | ||
623 | @misc{SEC1, | |
624 | author = {{Certicom Research}}, | |
625 | title = {Standards for Efficient Cryptography, {SEC} 1: | |
626 | {E}lliptic curve cryptography, Version 1.0}, | |
627 | year = {2000}, | |
628 | url = {http://www.secg.org/download/aid-385/sec1_final.pdf}, | |
629 | } | |
630 | ||
631 | @misc{cryptoeprint:2006:280, | |
632 | author = {Mario Di Raimondo and Rosario Gennaro and | |
633 | Hugo Krawczyk}, | |
634 | howpublished = {Cryptology ePrint Archive, Report 2006/280}, | |
635 | title = {Deniable Authentication and Key Exchange}, | |
636 | year = {2006}, | |
637 | url = {http://eprint.iacr.org/2006/280}, | |
638 | } | |
639 | ||
640 | @misc{rfc793, | |
641 | author = {J. Postel}, | |
642 | howpublished = {RFC 793 (Standard)}, | |
643 | month = sep, | |
644 | note = {Updated by RFCs 1122, 3168}, | |
645 | number = {793}, | |
646 | publisher = {IETF}, | |
647 | series = {Request for Comments}, | |
648 | title = {{Transmission Control Protocol}}, | |
649 | year = {1981}, | |
650 | url = {http://www.ietf.org/rfc/rfc793.txt}, | |
651 | } | |
652 | ||
653 | @misc{rfc768, | |
654 | author = {J. Postel}, | |
655 | howpublished = {RFC 768 (Standard)}, | |
656 | month = aug, | |
657 | number = {768}, | |
658 | publisher = {IETF}, | |
659 | series = {Request for Comments}, | |
660 | title = {{User Datagram Protocol}}, | |
661 | year = {1980}, | |
662 | url = {http://www.ietf.org/rfc/rfc768.txt}, | |
663 | } | |
664 | ||
665 | @incollection{Bellare:2000:AER, | |
666 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
667 | etc.}, | |
668 | author = {Mihir Bellare and Chanathip Namprempre}, | |
669 | booktitle = {Advances in cryptology---ASIACRYPT 2000 (Kyoto)}, | |
670 | pages = {531--545}, | |
671 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
672 | series = {Lecture Notes in Comput. Sci.}, | |
673 | title = {Authenticated Encryption: Relations among Notions and | |
674 | Analysis of the Generic Composition Paradigm}, | |
675 | volume = {1976}, | |
676 | year = {2000}, | |
677 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
678 | 1976/19760531.htm; http://link.springer-ny.com/link/service/ | |
679 | series/0558/papers/1976/19760531.pdf}, | |
680 | } | |
681 | ||
682 | @inproceedings{Krawczyk:2001:OEA, | |
683 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
684 | etc.}, | |
685 | author = {Hugo Krawczyk}, | |
686 | booktitle = {Advances in cryptology --- {CRYPTO} 2001: 21st Annual | |
687 | International Cryptology Conference, Santa Barbara, | |
688 | California, {USA}, August 19--23, 2001: proceedings}, | |
689 | editor = {Joe Kilian}, | |
690 | pages = {310--??}, | |
691 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
692 | series = {Lecture Notes in Computer Science}, | |
693 | title = {The Order of Encryption and Authentication for | |
694 | Protecting Communications (or: How Secure Is {SSL}?)}, | |
695 | volume = {2139}, | |
696 | year = {2001}, | |
697 | isbn = {3-540-42456-3 (paperback)}, | |
698 | url = {http://link.springer-ny.com/link/service/series/0558/bibs/ | |
699 | 2139/21390310.htm; http://link.springer-ny.com/link/service/ | |
700 | series/0558/papers/2139/21390310.pdf}, | |
701 | } | |
702 | ||
703 | @article{Rogaway:2003:OBC, | |
704 | author = {Phillip Rogaway and Mihir Bellare and John Black}, | |
705 | journal = {ACM Transactions on Information and System Security}, | |
706 | month = aug, | |
707 | number = {3}, | |
708 | pages = {365--403}, | |
709 | title = {{OCB}: {A} block-cipher mode of operation for | |
710 | efficient authenticated encryption}, | |
711 | volume = {6}, | |
712 | year = {2003}, | |
713 | issn = {1094-9224 (print), 1557-7406 (electronic)}, | |
714 | } | |
715 | ||
716 | @inproceedings{Bellare:2004:EAX, | |
717 | author = {Mihir Bellare and Phillip Rogaway and David Wagner}, | |
718 | booktitle = {FSE}, | |
719 | editor = {Bimal K. Roy and Willi Meier}, | |
720 | pages = {389--407}, | |
721 | publisher = {Springer}, | |
722 | series = {Lecture Notes in Computer Science}, | |
723 | title = {The {EAX} Mode of Operation}, | |
724 | volume = {3017}, | |
725 | year = {2004}, | |
726 | isbn = {3-540-22171-9}, | |
727 | url = {http://www.cs.berkeley.edu/~daw/papers/eax-fse04.ps}, | |
728 | } | |
729 | ||
730 | @inproceedings{McGrew:2004:SPG, | |
731 | author = {David A. McGrew and John Viega}, | |
732 | booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th | |
733 | International Conference on Cryptology in India, | |
734 | Chennai, India, December 20-22, 2004, Proceedings}, | |
735 | editor = {Anne Canteaut and Kapalee Viswanathan}, | |
736 | pages = {343--355}, | |
737 | publisher = {Springer}, | |
738 | series = {Lecture Notes in Computer Science}, | |
739 | title = {The Security and Performance of the Galois/Counter | |
740 | Mode ({GCM}) of Operation}, | |
741 | volume = {3348}, | |
742 | year = {2004}, | |
743 | isbn = {3-540-24130-2}, | |
744 | url = {http://eprint.iacr.org/2004/193}, | |
745 | } | |
746 | ||
747 | @inproceedings{Rogaway:2002:AEA, | |
748 | address = {Washington, DC, USA}, | |
749 | author = {Phillip Rogaway}, | |
750 | booktitle = {Proceedings of the 9th {ACM} Conference on Computer | |
751 | and Communications Security}, | |
752 | editor = {Ravi Sandhu}, | |
753 | month = nov, | |
754 | pages = {98--107}, | |
755 | publisher = {ACM Press}, | |
756 | title = {Authenticated-encryption with associated-data}, | |
757 | year = {2002}, | |
758 | abstract = {When a message is transformed into a ciphertext in a | |
759 | way designed to protect both its privacy and | |
760 | authenticity, there may be additional information, | |
761 | such as a packet header, that travels alongside the | |
762 | ciphertext (at least conceptually) and must get | |
763 | authenticated with it. We formalize and investigate | |
764 | this authenticated-encryption with associated-data | |
765 | (AEAD) problem. Though the problem has long been | |
766 | addressed in cryptographic practice, it was never | |
767 | provided a definition or even a name. We do this, and | |
768 | go on to look at efficient solutions for AEAD, both | |
769 | in general and for the authenticated-encryption | |
770 | scheme OCB. For the general setting we study two | |
771 | simple ways to turn an authenticated-encryption | |
772 | scheme that does not support associated-data into one | |
773 | that does: nonce stealing and ciphertext translation. | |
774 | For the case of OCB we construct an AEAD-scheme by | |
775 | combining OCB and the pseudorandom function PMAC, | |
776 | using the same key for both algorithms. We prove | |
777 | that, despite ``interaction'' between the two schemes | |
778 | when using a common key, the combination is sound. We | |
779 | also consider achieving AEAD by the generic | |
780 | composition of a nonce-based, privacy-only encryption | |
781 | scheme and a pseudorandom function.}, | |
782 | url = {http://www.cs.ucdavis.edu/~rogaway/papers/ad.html}, | |
783 | } | |
784 | ||
785 | @proceedings{Desmedt:1994:ACC, | |
786 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
787 | etc.}, | |
788 | booktitle = {{Advances in cryptology, {CRYPTO '94}: 14th annual | |
789 | international cryptology conference, Santa Barbara, | |
790 | California, {USA}, August 21--25, 1994: proceedings}}, | |
791 | editor = {Yvo G. Desmedt}, | |
792 | pages = {xii + 438}, | |
793 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
794 | series = {Lecture Notes in Computer Science}, | |
795 | title = {{Advances in cryptology, {CRYPTO '94}: 14th annual | |
796 | international cryptology conference, Santa Barbara, | |
797 | California, {USA}, August 21--25, 1994: proceedings}}, | |
798 | volume = {839}, | |
799 | year = {1994}, | |
800 | doi = {????}, | |
801 | isbn = {3-540-58333-5 (Berlin), 0-387-58333-5 (New York)}, | |
802 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
803 | url = {http://link.springer-ny.com/link/service/series/0558/tocs/ | |
804 | t0839.htm; http://www.springerlink.com/openurl.asp? | |
805 | genre=issue&issn=0302-9743&volume=839}, | |
806 | } | |
807 | ||
808 | @proceedings{Kilian:2001:ACC, | |
809 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
810 | etc.}, | |
811 | booktitle = {Advances in cryptology --- {CRYPTO} 2001: 21st Annual | |
812 | International Cryptology Conference, Santa Barbara, | |
813 | California, {USA}, August 19--23, 2001: proceedings}, | |
814 | editor = {Joe Kilian}, | |
815 | pages = {xi + 598}, | |
816 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
817 | series = {Lecture Notes in Computer Science}, | |
818 | title = {Advances in cryptology --- {CRYPTO} 2001: 21st Annual | |
819 | International Cryptology Conference, Santa Barbara, | |
820 | California, {USA}, August 19--23, 2001: proceedings}, | |
821 | volume = {2139}, | |
822 | year = {2001}, | |
823 | isbn = {3-540-42456-3 (paperback)}, | |
824 | url = {http://link.springer-ny.com/link/service/series/0558/tocs/ | |
825 | t2139.htm}, | |
826 | } | |
827 | ||
828 | @proceedings{IEEE:1997:ASF, | |
829 | address = {1109 Spring Street, Suite 300, Silver Spring, MD | |
830 | 20910, USA}, | |
831 | booktitle = {38th Annual Symposium on Foundations of Computer | |
832 | Science: October 20--22, 1997, Miami Beach, Florida}, | |
833 | editor = {{IEEE}}, | |
834 | note = {IEEE catalog number 97CB36150. IEEE Computer Society | |
835 | Press order number PR08197.}, | |
836 | pages = {xiii + 606}, | |
837 | publisher = {IEEE Computer Society Press}, | |
838 | title = {38th Annual Symposium on Foundations of Computer | |
839 | Science: October 20--22, 1997, Miami Beach, Florida}, | |
840 | year = {1997}, | |
841 | isbn = {0-8186-8197-7, 0-8186-8198-5 (casebound), | |
842 | 0-8186-8199-3 (microfiche)}, | |
843 | issn = {0272-5428}, | |
844 | } | |
845 | ||
846 | @proceedings{ACM:1995:PTS, | |
847 | address = {New York, NY, USA}, | |
848 | booktitle = {Proceedings of the twenty-seventh annual {ACM} | |
849 | Symposium on Theory of Computing: Las Vegas, Nevada, | |
850 | May 29--June 1, 1995}, | |
851 | editor = {{ACM}}, | |
852 | note = {ACM order no. 508950.}, | |
853 | pages = {viii + 763}, | |
854 | publisher = {ACM Press}, | |
855 | title = {Proceedings of the twenty-seventh annual {ACM} | |
856 | Symposium on Theory of Computing: Las Vegas, Nevada, | |
857 | May 29--June 1, 1995}, | |
858 | year = {1995}, | |
859 | isbn = {0-89791-718-9}, | |
860 | } | |
861 | ||
862 | @proceedings{ACM:1998:PTA, | |
863 | address = {New York, NY, USA}, | |
864 | booktitle = {Proceedings of the thirtieth annual {ACM} Symposium | |
865 | on Theory of Computing: Dallas, Texas, May 23--26, | |
866 | 1998}, | |
867 | editor = {{ACM}}, | |
868 | note = {ACM order number 508980.}, | |
869 | pages = {x + 684}, | |
870 | publisher = {ACM Press}, | |
871 | title = {Proceedings of the thirtieth annual {ACM} Symposium | |
872 | on Theory of Computing: Dallas, Texas, May 23--26, | |
873 | 1998}, | |
874 | year = {1998}, | |
875 | isbn = {0-89791-962-9}, | |
876 | } | |
877 | ||
878 | @proceedings{DeSantis:1995:ACE, | |
879 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
880 | etc.}, | |
881 | booktitle = {Advances in cryptology --- {EUROCRYPT} '94: Workshop | |
882 | on the Theory and Application of Cryptographic | |
883 | Techniques, Perugia, Italy, May 9--12, 1994: | |
884 | proceedings}, | |
885 | editor = {Alfredo {De Santis}}, | |
886 | pages = {xiii + 472}, | |
887 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
888 | series = {Lecture Notes in Computer Science}, | |
889 | title = {Advances in cryptology --- {EUROCRYPT} '94: Workshop | |
890 | on the Theory and Application of Cryptographic | |
891 | Techniques, Perugia, Italy, May 9--12, 1994: | |
892 | proceedings}, | |
893 | volume = {950}, | |
894 | year = {1995}, | |
895 | isbn = {3-540-60176-7}, | |
896 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
897 | } | |
898 | ||
899 | @proceedings{Coppersmith:1995:ACC, | |
900 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
901 | etc.}, | |
902 | booktitle = {{Advances in cryptology, {CRYPTO '95}: 15th Annual | |
903 | International Cryptology Conference, Santa Barbara, | |
904 | California, {USA}, August 27--31, 1995: proceedings}}, | |
905 | editor = {Don Coppersmith}, | |
906 | note = {Sponsored by the International Association for | |
907 | Cryptologic Research (IACR), in cooperation with the | |
908 | IEEE Computer Society Technical Committee on Security | |
909 | and Privacy.}, | |
910 | pages = {xii + 465}, | |
911 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
912 | series = {Lecture Notes in Computer Science}, | |
913 | title = {{Advances in cryptology, {CRYPTO '95}: 15th Annual | |
914 | International Cryptology Conference, Santa Barbara, | |
915 | California, {USA}, August 27--31, 1995: proceedings}}, | |
916 | volume = {963}, | |
917 | year = {1995}, | |
918 | doi = {????}, | |
919 | isbn = {3-540-60221-6 (Berlin)}, | |
920 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
921 | url = {http://link.springer-ny.com/link/service/series/0558/tocs/ | |
922 | t0963.htm; http://www.springerlink.com/openurl.asp? | |
923 | genre=issue&issn=0302-9743&volume=963}, | |
924 | } | |
925 | ||
926 | @proceedings{Koblitz:1996:ACC, | |
927 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
928 | etc.}, | |
929 | booktitle = {{Advances in cryptology, {CRYPTO '96}: 16th annual | |
930 | international cryptology conference, Santa Barbara, | |
931 | California, {USA}, August 18--22, 1996: proceedings}}, | |
932 | editor = {Neal Koblitz}, | |
933 | note = {Sponsored by the International Association for | |
934 | Cryptologic Research (IACR), in cooperation with the | |
935 | IEEE Computer Society Technical Committee on Security | |
936 | and Privacy and the Computer Science Department of | |
937 | the University of California at Santa Barbara | |
938 | (UCSB).}, | |
939 | pages = {xii + 415}, | |
940 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
941 | series = {Lecture Notes in Computer Science}, | |
942 | title = {{Advances in cryptology, {CRYPTO '96}: 16th annual | |
943 | international cryptology conference, Santa Barbara, | |
944 | California, {USA}, August 18--22, 1996: proceedings}}, | |
945 | volume = {1109}, | |
946 | year = {1996}, | |
947 | annote = {``Sponsored by the International Association for | |
948 | Cryptologic Research (IACR), in cooperation with the | |
949 | IEEE Computer Society Technical Committee on Security | |
950 | and Privacy and the Computer Science Department of | |
951 | the University of California at Santa Barbara | |
952 | (UCSB)''}, | |
953 | doi = {????}, | |
954 | isbn = {3-540-61512-1}, | |
955 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
956 | url = {http://link.springer-ny.com/link/service/series/0558/tocs/ | |
957 | t1109.htm; http://www.springerlink.com/openurl.asp? | |
958 | genre=issue&issn=0302-9743&volume=1109}, | |
959 | } | |
960 | ||
961 | @proceedings{Blakley:1985:ACP, | |
962 | address = {Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ | |
963 | etc.}, | |
964 | booktitle = {{Advances in Cryptology: Proceedings of CRYPTO 84}}, | |
965 | editor = {George Robert Blakley and David Chaum}, | |
966 | note = {CRYPTO 84: a Workshop on the Theory and Application | |
967 | of Cryptographic Techniques, held at the University | |
968 | of California, Santa Barbara, August 19--22, 1984, | |
969 | sponsored by the International Association for | |
970 | Cryptologic Research.}, | |
971 | pages = {ix + 491}, | |
972 | publisher = {Spring{\-}er-Ver{\-}lag}, | |
973 | series = {Lecture Notes in Computer Science}, | |
974 | title = {{Advances in Cryptology: Proceedings of CRYPTO 84}}, | |
975 | volume = {196}, | |
976 | year = {1985}, | |
977 | doi = {http://dx.doi.org/10.1007/3-540-39568-7}, | |
978 | isbn = {0-387-15658-5; 3-540-39568-7}, | |
979 | issn = {0302-9743 (print), 1611-3349 (electronic)}, | |
980 | url = {http://link.springer-ny.com/link/service/series/0558/tocs/ | |
981 | t0196.htm; http://www.springerlink.com/content/cemajg0qmeev/ | |
982 | ; http://www.springerlink.com/openurl.asp?genre=issue& | |
983 | issn=0302-9743&volume=196}, | |
984 | } | |
985 |