22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

18 Mihir Bellare, Thomas Ristenpart, and Stefano Tessaro<br />

20. R. Impagliazzo and V. Kabanets. Constructive proofs of concentration bounds.<br />

In M. J. Serna, R. Shaltiel, K. Jansen, and J. D. P. Rolim, editors, APPROX-<br />

RANDOM, volume 6302 of LNCS, pages 617–631. Springer, 2010.<br />

21. J. Kelsey, B. Schneier, C. Hall, and D. Wagner. Secure applications of low-entropy<br />

keys. In E. Okamoto, G. I. Davida, and M. Mambo, editors, 1st Information<br />

Security Workshop (ISW ’97), volume 1396 of LNCS, pages 121–134. Springer,<br />

Sept. 1998.<br />

22. T. Kohno. Attacking and repairing the winZip encryption scheme. In V. Atluri,<br />

B. Pfitzmann, and P. McDaniel, editors, ACM CCS 04, pages 72–81. ACM Press,<br />

Oct. 2004.<br />

23. H. Krawczyk. Cryptographic extraction and key derivation: The HKDF scheme. In<br />

T. Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 631–648. Springer,<br />

Aug. 2010.<br />

24. M. Luby and C. Rackoff. A study of password security. In C. Pomerance, editor,<br />

CRYPTO’87, volume 293 of LNCS, pages 392–397. Springer, Aug. 1988.<br />

25. U. M. Maurer, K. Pietrzak, and R. Renner. Indistinguishability amplification.<br />

In A. Menezes, editor, CRYPTO 2007, volume 4622 of LNCS, pages 130–149.<br />

Springer, Aug. 2007.<br />

26. U. M. Maurer, R. Renner, and C. Holenstein. Indifferentiability, impossibility<br />

results on reductions, and applications to the random oracle methodology. In<br />

M. Naor, editor, TCC 2004, volume 2951 of LNCS, pages 21–39. Springer, Feb.<br />

2004.<br />

27. U. M. Maurer and S. Tessaro. Computational indistinguishability amplification:<br />

Tight product theorems for system composition. In S. Halevi, editor,<br />

CRYPTO 2009, volume 5677 of LNCS, pages 355–373. Springer, Aug. 2009.<br />

28. U. M. Maurer and S. Tessaro. A hardcore lemma for computational indistinguishability:<br />

Security amplification for arbitrarily weak PRGs with optimal stretch. In<br />

D. Micciancio, editor, TCC 2010, volume 5978 of LNCS, pages 237–254. Springer,<br />

Feb. 2010.<br />

29. R. Morris and K. Thompson. Password security: a case history. Commun. ACM,<br />

22:594–597, November 1979.<br />

30. S. Myers. Efficient amplification of the security of weak pseudo-random function<br />

generators. Journal of Cryptology, 16(1):1–24, Jan. 2003.<br />

31. A. Panconesi and A. Srinivasan. Randomized distributed edge coloring via an<br />

extensionofthechernoff-hoeffdingbounds. SIAM J. Comput.,26(2):350–368, 1997.<br />

32. PKCS #5: Password-based cryptography standard (rfc 2898). RSA Data Security,<br />

Inc., Sept. 2000. Version 2.0.<br />

33. T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with composition: Limitations<br />

of the indifferentiability framework. In K. G. Paterson, editor, EURO-<br />

CRYPT 2011, volume 6632 of LNCS, pages 487–506. Springer, May 2011.<br />

34. S. Tessaro. Security amplification for the cascade of arbitrarily weak PRPs: Tight<br />

bounds via the interactive hardcore lemma. In Y. Ishai, editor, TCC 2011, volume<br />

6597 of LNCS, pages 37–54. Springer, Mar. 2011.<br />

35. F. Unger. A probabilistic inequality with applications to threshold direct-product<br />

theorems. In 50th FOCS, pages 221–229. IEEE Computer Society Press, Oct. 2009.<br />

36. D. Wagner and I. Goldberg. Proofs of security for the Unix password hashing<br />

algorithm. In T. Okamoto, editor, ASIACRYPT 2000, volume 1976 of LNCS,<br />

pages 560–572. Springer, Dec. 2000.<br />

37. A. C. Yao. Theory and applications of trapdoor functions. In 23rd FOCS, pages<br />

80–91. IEEE Computer Society Press, Nov. 1982.<br />

14. Multi-Instance Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!