The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modifiable media raises the issue of how to certify when a document was …
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems …
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
M Bellare, P Rogaway - Annual international cryptology conference, 1993 - Springer
We provide the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment. Addressed in detail are the problems …
Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show how to construct a pseudorandom generator from any one-way …
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a program (or circuit) P and produces a new program O (P) that has the same functionality as …
D Dolev, C Dwork, M Naor - Proceedings of the twenty-third annual ACM …, 1991 - dl.acm.org
The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …
R Impagliazzo, S Rudich - Proceedings of the twenty-first annual ACM …, 1989 - dl.acm.org
We present strong evidence that the implication,“if one-way permutations exist, then secure secret key agreement is possible”, is not provable by standard techniques. Since both sides …
We compare the relative strengths of popular notions of security for public key encryption schemes. We consider the goals of privacy and non-malleability, each under chosen …