Another look at "provable security" - II

被引:0
|
作者
Koblitz, Neal [1 ]
Menezes, Alfred [2 ]
机构
[1] Univ Washington, Dept Math, Seattle, WA 98195 USA
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety and difficulty of this question.
引用
收藏
页码:148 / +
页数:4
相关论文
共 50 条
  • [31] Towards provable security for ubiquitous applications
    Burmester, Mike
    Van Le, Tri
    de Medeiros, Breno
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 295 - 312
  • [32] The Provable Extracting Security of Information Hiding
    Liu Jing
    Tang Guang-ming
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 519 - 524
  • [33] On the Provable Security of (EC)DSA Signatures
    Fersch, Manuel
    Kiltz, Eike
    Poettering, Bertram
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1651 - 1662
  • [34] ANOTHER LOOK
    DAVIES, M
    SPENCER, S
    BIO-TECHNOLOGY, 1993, 11 (08): : 860 - 860
  • [35] Another look at πιστιζ χριστου
    Hooker, Morna D.
    SCOTTISH JOURNAL OF THEOLOGY, 2016, 69 (01) : 46 - 62
  • [36] 'Another Look'
    Horne, L
    QUEENS QUARTERLY, 1997, 104 (01) : 179 - 179
  • [37] Another Look
    Fletcher, H. George
    NEW YORK TIMES BOOK REVIEW, 2014, 119 (17): : 6 - 6
  • [38] ANOTHER LOOK
    LEVISTRAUSS, C
    HOMME, 1993, 33 (2-4): : 7 - 10
  • [39] Efficient steganography with provable security guarantees
    Kiayias, A
    Raekow, Y
    Russell, A
    INFORMATION HIDING, 2005, 3727 : 118 - 130
  • [40] Provable security for block ciphers by decorrelation
    Vaudenay, S
    STACS 98 - 15TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1998, 1373 : 249 - 275