A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
The random oracle methodology, revisited
Journal of the ACM (JACM)
IEEE Security and Privacy
Remote timing attacks are practical
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
IEEE Security and Privacy
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
On the possibility of constructing meaningful hash collisions for public keys
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
In this installment of Crypto Corner, the author reviews how cryptographers transmutate trust, identifies some of the reasons why they fail, and investigate how they could do a better job.