22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Multi-instance Security and Password-based Cryptography 17<br />

3. M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting:<br />

Securityproofs and improvements. InB. Preneel, editor, EUROCRYPT 2000,<br />

volume 1807 of LNCS, pages 259–274. Springer, May 2000.<br />

4. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment<br />

of symmetric encryption. In 38th FOCS, pages 394–403. IEEE Computer Society<br />

Press, Oct. 1997.<br />

5. M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure<br />

against dictionary attacks. In B. Preneel, editor, EUROCRYPT 2000, volume 1807<br />

of LNCS, pages 139–155. Springer, May 2000.<br />

6. M. Bellare, T. Ristenpart, and S. Tessaro. Multi-instance security and its application<br />

to password-based cryptography. Cryptology ePrint Archive, Report<br />

2012/196, 2012. http://eprint.iacr.org/.<br />

7. M.Bellare andP.Rogaway. Randomoracles arepractical:Aparadigmfordesigning<br />

efficient protocols. In V. Ashby, editor, ACM CCS 93, pages 62–73. ACM Press,<br />

Nov. 1993.<br />

8. X. Boyen. Halting password puzzles: hard-to-break encryption from humanmemorable<br />

keys. In Proceedings of 16th USENIX Security Symposium on USENIX<br />

Security Symposium, page 9. USENIX Association, 2007.<br />

9. X. Boyen. New paradigms for password security (keynote lecture). In Y. Mu,<br />

W. Susilo, and J. Seberry, editors, ACISP 08, volume 5107 of LNCS, pages 1–5.<br />

Springer, July 2008.<br />

10. R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. D. MacKenzie. Universally composable<br />

password-based key exchange. In R. Cramer, editor, EUROCRYPT 2005,<br />

volume 3494 of LNCS, pages 404–421. Springer, May 2005.<br />

11. J.-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgård revisited:<br />

How to construct a hash function. In V. Shoup, editor, CRYPTO 2005, volume<br />

3621 of LNCS, pages 430–448. Springer, Aug. 2005.<br />

12. Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk,and T. Rabin. Randomness extraction<br />

and keyderivation usingthe CBC, cascade and HMACmodes. In M. Franklin,<br />

editor, CRYPTO 2004, volume 3152 of LNCS, pages 494–510. Springer, Aug. 2004.<br />

13. Y. Dodis, R. Impagliazzo, R. Jaiswal, and V. Kabanets. Security amplification for<br />

interactive cryptographic primitives. In O. Reingold, editor, TCC 2009, volume<br />

5444 of LNCS, pages 128–145. Springer, Mar. 2009.<br />

14. R. Gennaro and Y. Lindell. A framework for password-based authenticated key<br />

exchange. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages<br />

524–543. Springer, May 2003.<br />

15. O. Goldreich. Three XOR-Lemmas — An exposition, 1995. Available at: http:<br />

//www.wisdom.weizmann.ac.il/.<br />

16. O. Goldreich, R. Impagliazzo, L. A. Levin, R. Venkatesan, and D. Zuckerman.<br />

Security preserving amplification of hardness. In 31st FOCS, pages 318–326. IEEE<br />

Computer Society Press, Oct. 1990.<br />

17. O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In<br />

21st ACM STOC, pages 25–32. ACM Press, May 1989.<br />

18. O. Goldreich, N. Nisan, and A. Wigderson. On Yao’s XOR-lemma. In Studies in<br />

Complexity and Cryptography. Miscellanea on the Interplay between Randomness<br />

and Computation, volume 6650 of LNCS, pages 273–301. Springer, 2011.<br />

19. I. Haitner, D. Harnik, and O. Reingold. On the power of the randomized iterate.<br />

In C. Dwork, editor, CRYPTO 2006, volume 4117 of LNCS, pages 22–40. Springer,<br />

Aug. 2006.<br />

14. Multi-Instance Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!