Another look at "provable security" - II

被引:0
|
作者
Koblitz, Neal [1 ]
Menezes, Alfred [2 ]
机构
[1] Univ Washington, Dept Math, Seattle, WA 98195 USA
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety and difficulty of this question.
引用
收藏
页码:148 / +
页数:4
相关论文
共 50 条
  • [41] On the provable security of BEAR and LION schemes
    Maines, Lara
    Piva, Matteo
    Rimoldi, Anna
    Sala, Massimiliano
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2011, 22 (5-6) : 413 - 423
  • [42] PROVABLE SECURITY AGAINST A DIFFERENTIAL ATTACK
    NYBERG, K
    KNUDSEN, LR
    JOURNAL OF CRYPTOLOGY, 1995, 8 (01) : 27 - 37
  • [43] Another look
    Morring Jr., Frank
    Aviation Week and Space Technology (New York), 2005, 162 (20): : 43 - 44
  • [44] Limits in the Provable Security of ECDSA Signatures
    Hartmann, Dominik
    Kiltz, Eike
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 279 - 309
  • [45] NETWORKS ON CHIP WITH PROVABLE SECURITY PROPERTIES
    Wassel, Hassan M. G.
    Gao, Ying
    Oberg, Jason K.
    Huffmire, Ted
    Kastner, Ryan
    Chong, Frederic T.
    Sherwood, Timothy
    IEEE MICRO, 2014, 34 (03) : 57 - 68
  • [46] Provable security for public key schemes
    Pointcheval, D
    CONTEMPORARY CRYPTOLOGY, 2005, : 133 - 190
  • [47] On the provable security of BEAR and LION schemes
    Lara Maines
    Matteo Piva
    Anna Rimoldi
    Massimiliano Sala
    Applicable Algebra in Engineering, Communication and Computing, 2011, 22 : 413 - 423
  • [48] Fundamental problems in provable security and cryptography
    Dent, Alexander W.
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2006, 364 (1849): : 3215 - 3230
  • [49] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [50] A provable scheme for homomorphic obfuscations in software security
    Zhu, William
    Thomborson, Clark
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 208 - 212