papers - Department of Computer Science and Electrical

advertisement
Required and Supplemental Readings
CMSC-652 Cryptology
Alan T. Sherman, Fall 2002
Department of CSEE, UMBC
Fall 2002
I. Papers Presented (Required Reading)
[And96] Anderson, Ross, and Markus Kuhn, “Tamper resistance–A cautionary note,” Second USENIX
Workshop on Electronic Commerce (November 1996), 1–11.
[BCK96] Bellare, Mihir, Ran Canetti, and Hugo Krawczyk, “Keying hash functions for message
authentication,”
Technical report (June 1996). 19 pages. [An abridged version appears in Crypto 1996. LNCS 1109.]
[BiS90] Biham, Eli, and Adi Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Crypto 90,
LNCS 537 (2000), 2–21.
[BiS92] Biham, Eli, and Adi Shamir, “Differential cryptanalysis of the full 16-round DES,” Crypto 92,
LNCS 740 (2002), 487–496.
[Bra79] Brassard, Gilles, “A note on the complexity of cryptography,” IEEE Transactions on
Information Theory, vol. IT-25, no. 2 (March 1979), 232–233.
[Bro] Brown, Daniel R. L., “The exact security of ECDSA,” Univ. of Waterloo technical report CORR
2000-54 (2000), Certicom Research. 19 pages.
[Cac95] Cachin, Christian, “On-line secret sharing,” Crypto 95?, LNCS 1025, Springer (1995), 190–198.
[CaS97] Cain, Thomas R., and Alan T. Sherman, “How to break Gifford’s cipher,” Cryptologia,
vol. XXI, no. 3 (July 1997), GET-PAGES.
[Cha02] Chaum, David, “Secret-Ballot receipts and transparent integrity,” unpublished manuscript (May
2002). 12 pages. www.vreceipt.com
[DiH79] Diffie, Whitfield, and Martin E. Hellman, “Privacy and authentication: An introduction to
cryptography,” Proceedings of the IEEE, vol. 67, no. 3 (March 1979), 397–427.
[Dwo02] Dworkin, Morris, “DRAFT recommendation for block ciphers modes of operation: The
RMAC authentication mode,” NIST Special Publication 800-38B (October 18, 2002). 16 pages.
[FiS00] Fischline, R., and C. P. Schnorr, “Stronger security proofs for RSA and Rabin bits,” Journal of
Cryptology, vol. 13 (2000), 221–244.
[FMS01] Fluhrer, Scott, Itsik Mantin, and Adi Shamir, “Weaknesses in the key scheduling algorithm of
RC4” in Proceedings of SAC 2001 (August 2001) , 1–24.
[GeT00] Gennaro, Rosario, and Tal Rabin, “RSA-Based undeniable signatures,” Journal of Crytology,
vol 13 (2000), 397–416.
[HLA02] Hopper, Nicholas J., John Langford, and Luis von Ahn, “Provably secure steganography,”
Crypto 02, LNCS ?, Springer (2002), get pages.
[JoG02] Johnston, Anna M., and Peter S. Gemmell, “Authenticated key exchange provably secure
against the Man-in-the-middle Attack,” Journal of Cryptology, vol. 15 (2002), 139–148.
LPW02] Lipmaa, Heiger, Phillip Rogaway, and David Wagner, “Comments to NIST concerning AES
modes of operations: CTR-Mode Encryption,” (get date). 4 pages.
[MuR02] Murphy, Sean, and Mathew J. B. Robshaw, “Essential algebraic structure within the AES,”
Crypto 2002, LNCS 2442, Springer-Verlag (2002), 1–16.
[Riv90] Rivest, Ronald L., “Cryptology,” Chapter 13 in Handbook of Theoretical Computer Science,
vol. A, Jan can Leeuwen, ed., Elsevier / MIT Press (1990), 717–755.
[RSA78] Rivest, R. L., A. Shamir, and L. Adleman, “A method for obtaining digital signatures and
public-key cryptosystems,” CACM, vol. 21, no. 2 (February 1978), 120–126.
[RiL96] Rivest, Ronald L., and Butler Lampson, “SDSI: A simple distributed security infrastructure,”
unpublisjed manuscript, MIT (October 1996). http://theory.lcs.mit.edu/~rivest
[RiM02] Rivest, Ronald L., and Silvio Micali, “Micropayments revisited,” unpublished document, MIT
Lab for Computer Science (circa 2002). 16 pages.
[Sha49] Shannon, C. E., “Communication theory of secrecy systems,” Bell System Technical Journal,
vol. 28 (October 1949), 656–715. [The original confidential report was dated September 1, 1945.]
[ShM02] Sherman, Alan T., and David A. McGrew, “Key establishment in large dynamic groups using
one-way function trees,” NAI Labs Technical Report TR-02-017 (July 2002), 37 pages. Conditionally
accepted to IEEE TSE.
[SHP00] Shor, Peter W., and John Preskill, “Simple proof of security of the BB84 quantum key
distribution protocol,” Physical review Letters, vol. 85, no. 2 (July 10, 2000), 441–444.
[Wag00] Wagner, David, “Cryptanalysis of the Yi-Lam hash,” Asiacrypt 2000, LNCS 1976 (2000), 483–
488.
II. Supplemental Papers
[AMV93] Agnew, G. B., R. C. Mullin, and S. A. Vanstone, “An implementation of elliptic curve
cryptosystems over F(2155),” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5 (June
1993), 804–813.
[BeB02] Bellovin, Steven M., and Matt Blaze, “Cryptographic modes of operation for the Internet,” (get
date). 6 pages.
[DzM02] Dziembowski, Stefan, and Ueli Maurer, “Tight security proofs for the bounded-storage
model,” STOC ’02 (2002). 10 pages.
[FuL93] Fumy, Walter, and Peter Landrock, “Principles of key management,” IEEE Journal on Selected
Areas in Communications, vol. 11, no. (June 1993), 785–793.
[GoM84] Goldwasser, Shafi, and Silvio Micali, “Probabilistic encryption,” Journal of Computer and
System Sciences, vol. 28, no. 2 (April 1984), 270–298.
[Hei02] Heiser, Jay, “My infosec heroes,” Information Security (November 2002), 68–66.
[JJV02] Jaulmes, Eliane, Antonine Joux, and Frederic Valette, “On the security of randomlized CBCMAC Beyond the birthday paradox limit A new construction,” FSE 2002, LNCS 2365, Springer-Verlag
(2002), 237-251.
[Joh88] Johnson, David, “Interactive proof systems for fun and profit” in “The NP-completeness
Columns: An ongoing guide,” Journal of Algorithms, vol. 9 (1988), 426–444.
[JMV01] Johnson, Don, Alfred Menezes, Scott Vanstone, “The elliptic curve Digital Signature
Algorithm (ECDSA),” IJIS, vol. 1, issue 1 (2001), 36–63.
{Kol02] Kolata, Gina, “The key vanishes: Scientist outlines unbreakable code,” New York Times
(February 2001).
[MSST98] Maughan, D., M. Schertler, M. Schneider, and J. Turner, “Internet Security Association and
Key Management Protocol (ISAKMP)” (November 1998), selected pages.
http://www.ieft.org/rfc/rfc2408.tex
[NIST01] Report on the Second Modes of Operation Workshop (circa August 2001). 16 pages.
[NIST02] Modes of operation for symmetric key block ciphers, NIST,
http://csrc.nist.gov/encryption/modes/proposedmodes (September 18, 2002).
[Pet02] Peterson, Ivars, “Prime pursuit,” Science News, vol. 162 (October 26, 2002), 266–267.
[RC4] Alleged RC4 source code, anonymous posting to cypherpunks (September 9, 1994). Message
title: “Thank you Bob Anderson.” Author: nobody@jpunix.com
[She98] Rabi, Muhammad, and Alan Sherman, “An observation on associative one-way functions in
complexity theory,” Information Processing Letters, vol. ?, no. ? (1998), get pages.
[Sel92] Selman, Alan L., “A survey of one-way functions in complexity theory,” Mathematical Systems
Theory, vol. 25, no. 3 (1992), 203–221.
[Sha] Shamir, Adi, “How to share a secret,” (get ref).
http://szabo.best.vwh.net/secret.html
[Riv98] Rivest, Ronald L., “Part 4: Block and Stream Ciphers,” 6.857 Computer and Network Security:
Lecture Notes (Draft), (September 26, 1998). 11 pages.
[Yao82] Yao, Andrew C., “Theory and applications of trapdoor functions,” Proceedings of the 23rd
FOCS (November 1982), extended abstract, 80–91.
[YiL97] Yi, Xun, and Kwok Yan Lam, “Hash function based on block cipher,” Electronic Letters ,
vol. 33, no. 23 (November 6, 1997), 1938–1940.
III. Suggested References
[And01] Anderson, Ross, Security Engineering, Wiley (New York, 2001). ISBN 0-471-38922-6
[MOV97] Menezes, Alfred J., Paul C. van Oorchot, and Scott A. Vanstone, Handbook of Applied
Cryptography, CRC Press (Boca Raton, 1997). ISBN 0-8493-8523-7
[Sch96] Schneier, Bruce, Applied Cryptography, Wiley, second edition (New York, 1996). ISBN 0-47112845-7
[Sti02] Stinson, Douglas, R., Cryptography: Theory and Practice, Chapman & Hall / CRC, second
edition (Boca Raton, 2002). IBSN 1-5848-8206-9
[Crypto02] Young, Moti, ed., Advances in Cryptology–Crypto 2002, LNCS 2442, Springer-Verlag
(2002).
IV. Abbreviations
ACM
AES
CACM
Crypto
CSEE
DSA
FOCS
FSE
IACR
IEEE
IEFT
IJIS
LNCS
NAI
NIST
SAC
SIAM
STOC
TSE
UMBC
USENIX
Association for Computer Machinery
Advanced Encryption Standard
Communications of the ACM
Crypto Conference, sponsored by the IACR.
Computer Science and Electrical Engineering
Digital Signature Algorithm
Foundations of Computer Science
Fast Software Encryption
International Association for Cryptologic Research
Institute of Electrical and Electronic Engineers
Internet Engineering Task Force
International Journal of Information Security
Lecture Notes in Computer Science, published by Springer-Verlag
Network Associates, Inc.
National Institute for Standards and Technology
Annual Workshop on Selected Areas in Cryptography
Society of Industrial and Applied Mathematics
Symposium on Theory of Computing
Transactions on Software Engineering
University of Maryland, Baltimore County
Advanced Computing Systems Association. Sponsors the USENIX Security
Symposium.
Download