Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of: Stream ciphers and block ciphers, including modes of operation and design principles Authenticated encryption and secure communication sessions Hash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacks The random-oracle model and its application to several standardized, widely used public-key encryption and signature schemes Elliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIES Containing updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study.
Cited By
- Stock J, Heitmann H, Schug J and Demmler D DealSecAgg: Efficient Dealer-Assisted Secure Aggregation for Federated Learning Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-11)
- Smith C, Tabassum M, Daruru S, Kulhare G, Wang A, Miller E and Zadok E Secure Archival is Hard... Really Hard Proceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems, (38-46)
- Liu C, Hu X, Chen X, Wei J and Liu W (2024). SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks, IEEE Transactions on Dependable and Secure Computing, 21:4, (3469-3486), Online publication date: 1-Jul-2024.
- Scala E, Dong C, Corradini F and Mostarda L (2024). ZeroMT, Journal of Information Security and Applications, 83:C, Online publication date: 1-Jun-2024.
- Tang X, Guo C, Choo K, Jiang X and Liu Y (2024). A secure and lightweight cloud data deduplication scheme with efficient access control and key management, Computer Communications, 222:C, (209-219), Online publication date: 1-Jun-2024.
- Mann Z, Weinert C, Chabal D and Bos J (2023). Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead, ACM Computing Surveys, 56:5, (1-37), Online publication date: 31-May-2024.
- Du Z, Liu L, Huang M, Fu Y and Zhang W (2024). Bulwark, Computer Networks: The International Journal of Computer and Telecommunications Networking, 242:C, Online publication date: 1-Apr-2024.
- Wong K, Yap W, Goi B, Wong D and Ye G (2024). Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map, Journal of Information Security and Applications, 81:C, Online publication date: 1-Mar-2024.
- Daudén-Esmel C, Castellà-Roca J and Viejo A (2024). Blockchain-based access control system for efficient and GDPR-compliant personal data management, Computer Communications, 214:C, (67-87), Online publication date: 15-Jan-2024.
- Miao G and Wu S (2024). Efficient Privacy-Preserving Logistic Model With Malicious Security, IEEE Transactions on Information Forensics and Security, 19, (5751-5766), Online publication date: 1-Jan-2024.
- Yang X, Zhao Y, Zhou S and Wang L (2024). A lightweight delegated private set intersection cardinality protocol, Computer Standards & Interfaces, 87:C, Online publication date: 1-Jan-2024.
- Varma I and Kumar N (2023). A comprehensive survey on SDN and blockchain-based secure vehicular networks, Vehicular Communications, 44:C, Online publication date: 1-Dec-2023.
- Saini R, Bera A, Behera B, Ahmed E, Jamjoom M and Farouk A (2024). Designing quantum blockchain system integrated with 6G network, Journal of King Saud University - Computer and Information Sciences, 35:10, Online publication date: 1-Dec-2023.
- Tan Q, Fisseha Y, Chen S, Biernacki L, Jeannin J, Malik S and Austin T Security Verification of Low-Trust Architectures Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (945-959)
- Modiri M, Salmasizadeh M, Mohajeri J and Khalaj B (2023). Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks, Computer Communications, 211:C, (286-301), Online publication date: 1-Nov-2023.
- Abadi A and Murdoch S Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, (855-869)
- Hristov T, İşler D, Laoutaris N and Erkin Z Graph Database Watermarking Using Pseudo-Nodes Proceedings of the Second ACM Data Economy Workshop, (14-20)
- Zhang Q, Yu Y, Li H, Yu J and Wang L (2023). Trustworthy sealed-bid auction with low communication cost atop blockchain, Information Sciences: an International Journal, 631:C, (202-217), Online publication date: 1-Jun-2023.
- Nouma S and Yavuz A Practical Cryptographic Forensic Tools for Lightweight Internet of Things and Cold Storage Systems Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, (340-353)
- Sober M, Kobelt M, Scaffino G, Kaaser D and Schulte S Distributed Key Generation with Smart Contracts using zk-SNARKs Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, (231-240)
- Zhang M, Liu J, Feng K, Beltran F and Zhang Z (2023). SmartAuction, Future Generation Computer Systems, 138:C, (198-211), Online publication date: 1-Jan-2023.
- Hallman R Poster EveGAN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (3355-3357)
- Nazirkhanova K, Neu J and Tse D Information Dispersal with Provable Retrievability for Rollups Proceedings of the 4th ACM Conference on Advances in Financial Technologies, (180-197)
- Keller P and Böhme R Parallel Proof-of-Work with Concrete Bounds Proceedings of the 4th ACM Conference on Advances in Financial Technologies, (1-15)
- Krasnowski P, Lebrun J and Martin B (2022). A novel distortion-tolerant speech encryption scheme for secure voice communication, Speech Communication, 143:C, (57-72), Online publication date: 1-Sep-2022.
- Tian C and Chen G (2022). An infinite perfect-secrecy system with non-uniformly distributed keys, Journal of Information Security and Applications, 68:C, Online publication date: 1-Aug-2022.
- Chang J, Ren Q, Ji Y, Xu M and Xue R (2022). Secure medical data management with privacy-preservation and authentication properties in smart healthcare system, Computer Networks: The International Journal of Computer and Telecommunications Networking, 212:C, Online publication date: 20-Jul-2022.
- Caulfield A, Rattanavipanon N and De Oliveira Nunes I ASAP Proceedings of the 59th ACM/IEEE Design Automation Conference, (721-726)
- Ajtai M, Braverman V, Jayram T, Silwal S, Sun A, Woodruff D and Zhou S The White-Box Adversarial Data Stream Model Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (15-27)
- Ulitzsch V, Park S, Marzougui S and Seifert J A Post-Quantum Secure Subscription Concealed Identifier for 6G Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (157-168)
- Panda S, Mondal S, Dewri R and Das A (2022). Towards achieving efficient access control of medical data with both forward and backward secrecy, Computer Communications, 189:C, (36-52), Online publication date: 1-May-2022.
- Nakano K (2022). Time-symmetric Turing machines for computable involutions, Science of Computer Programming, 215:C, Online publication date: 1-Mar-2022.
- Ali M, Sadeghi M, Liu X, Miao Y and Vasilakos A (2022). Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things, Journal of Information Security and Applications, 65:C, Online publication date: 1-Mar-2022.
- Singh J and Chaudhary N (2022). OAuth 2.0 , Journal of Information Security and Applications, 65:C, Online publication date: 1-Mar-2022.
- Xu Y, Peng C, Tan W, Tian Y, Ma M and Niu K (2022). Non-interactive verifiable privacy-preserving federated learning, Future Generation Computer Systems, 128:C, (365-380), Online publication date: 1-Mar-2022.
- J. A and R. S (2022). A faster secure content-based image retrieval using clustering for cloud▪, Expert Systems with Applications: An International Journal, 189:C, Online publication date: 1-Mar-2022.
- Wang X Progress in Applying Valuated Binary Tree to Factorize Big Integers Proceedings of the 2022 7th International Conference on Intelligent Information Technology, (90-94)
- Rabie T, Baziyad M and Kamel I (2021). Secure high payload steganography, Journal of Information Security and Applications, 63:C, Online publication date: 1-Dec-2021.
- Mohit P (2021). An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring, Journal of Information Security and Applications, 63:C, Online publication date: 1-Dec-2021.
- Delpech de Saint Guilhem C, Makri E, Rotaru D and Tanguy T The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (594-609)
- Yin F, Lu R, Zheng Y, Shao J, Yang X and Tang X (2021). Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud, Computers and Security, 110:C, Online publication date: 1-Nov-2021.
- Zhandry M (2021). How to Construct Quantum Random Functions, Journal of the ACM, 68:5, (1-43), Online publication date: 31-Oct-2021.
- Yao Y, Ghai T, Ravi S and Szekely P AMPPERE Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (2394-2403)
- Schett M and Danezis G Embedding a Deterministic BFT Protocol in a Block DAG Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, (177-186)
- Ammar M, Crispo B, De Oliveira Nunes I and Tsudik G Delegated attestation Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (37-47)
- Lawrence T, Li F, Ali I, Kpiebaareh M, Haruna C and Christopher T (2021). An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification, Journal of Systems Architecture: the EUROMICRO Journal, 116:C, Online publication date: 1-Jun-2021.
- Chen D, Yuan H, Hu S, Wang Q and Wang C (2020). BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication, IEEE Transactions on Parallel and Distributed Systems, 32:4, (786-798), Online publication date: 1-Apr-2021.
- Altarawneh A, Sun F, Brooks R, Hambolu O, Yu L and Skjellum A (2021). Availability analysis of a permissioned blockchain with a lightweight consensus protocol, Computers and Security, 102:C, Online publication date: 1-Mar-2021.
- Ren Y, Leng Y, Qi J, Sharma P, Wang J, Almakhadmeh Z and Tolba A (2021). Multiple cloud storage mechanism based on blockchain in smart homes, Future Generation Computer Systems, 115:C, (304-313), Online publication date: 1-Feb-2021.
- Suntaxi G, Ghazi A and Böhm K (2020). Preserving Secrecy in Mobile Social Networks, ACM Transactions on Cyber-Physical Systems, 5:1, (1-29), Online publication date: 31-Jan-2021.
- Yin F, Lu R, Zheng Y, Tang X and Jiang Q (2021). Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
- Arockiasamy J, Benjamin L, Vaidyanathan R and Conti V (2021). Beyond Statistical Analysis in Chaos-Based CSPRNG Design, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
- Al-Ahmadi W, Aljahdali A and Munshi A An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA Sequence Proceedings of the 4th International Conference on Future Networks and Distributed Systems, (1-5)
- Armknecht F, Walther P, Tsudik G, Beck M and Strufe T ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (211-223)
- Joque J and Haque S Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity Proceedings of the New Security Paradigms Workshop 2020, (99-110)
- Kapusta K, Rambaud M and Memmi G Revisiting Shared Data Protection Against Key Exposure Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, (165-177)
- Dai W, Gu X and Teng Y A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on Blockchain Algorithms and Architectures for Parallel Processing, (475-493)
- Chatterjee U, Chatterjee S, Mukhopadhyay D and Chakraborty R (2020). Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT, ACM Transactions on Design Automation of Electronic Systems, 25:4, (1-21), Online publication date: 2-Sep-2020.
- Boshrooyeh S, Küpçü A and Özkasap Ö (2020). Privado, ACM Transactions on Privacy and Security, 23:3, (1-36), Online publication date: 31-Aug-2020.
- Rahnama S, Gupta S, Qadah T, Hellings J and Sadoghi M (2020). Scalable, resilient, and configurable permissioned blockchain fabric, Proceedings of the VLDB Endowment, 13:12, (2893-2896), Online publication date: 1-Aug-2020.
- Mouris D and Tsoutsos N Pythia Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
- Carvalho H, Cruz D, Pontes R, Paulo J and Oliveira R On the Trade-Offs of Combining Multiple Secure Processing Primitives for Data Analytics Distributed Applications and Interoperable Systems, (3-20)
- Cao Y, Zhao Y, Li J, Lin R, Zhang J and Chen J (2020). Multi-Tenant Provisioning for Quantum Key Distribution Networks With Heuristics and Reinforcement Learning: A Comparative Study, IEEE Transactions on Network and Service Management, 17:2, (946-957), Online publication date: 1-Jun-2020.
- Viejo A and Sánchez D (2020). Secure monitoring in IoT-based services via fog orchestration, Future Generation Computer Systems, 107:C, (443-457), Online publication date: 1-Jun-2020.
- Li J, Yang Z, Ren Y, Lee P and Zhang X Balancing storage efficiency and data confidentiality with tunable encrypted deduplication Proceedings of the Fifteenth European Conference on Computer Systems, (1-15)
- Shen X, Zhu L, Xu C, Sharif K and Lu R (2020). A privacy-preserving data aggregation scheme for dynamic groups in fog computing, Information Sciences: an International Journal, 514:C, (118-130), Online publication date: 1-Apr-2020.
- Rachid M, Riley R and Malluhi Q (2020). Enclave-based oblivious RAM using Intel’s SGX, Computers and Security, 91:C, Online publication date: 1-Apr-2020.
- Iqbal H and Krawec W (2020). Semi-quantum cryptography, Quantum Information Processing, 19:3, Online publication date: 10-Feb-2020.
- Maivizhi R and Yogesh P Concealed Multidimensional Data Aggregation in Big Data Wireless Sensor Networks Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, (19-27)
- Shao Z, Kosari S, Anoos R, Sheikholeslami S, Dayap J and Lopez Gutierrez R (2020). Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator, Complexity, 2020, Online publication date: 1-Jan-2020.
- Chen Y, Tang C, Yi Z and Lopez Gutierrez R (2020). A Novel Image Encryption Scheme Based on PWLCM and Standard Map, Complexity, 2020, Online publication date: 1-Jan-2020.
- Du L, Li K, Liu Q, Wu Z and Zhang S (2020). Dynamic multi-client searchable symmetric encryption with support for boolean queries, Information Sciences: an International Journal, 506:C, (234-257), Online publication date: 1-Jan-2020.
- Galbraith S, Petit C and Silva J (2019). Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems, Journal of Cryptology, 33:1, (130-175), Online publication date: 1-Jan-2020.
- Jackson D, Cremers C, Cohn-Gordon K and Sasse R Seems Legit Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (2165-2180)
- Gong G, He M, Rohit R and Yi Y U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme Foundations and Practice of Security, (261-272)
- Nautsch A, Jiménez A, Treiber A, Kolberg J, Jasserand C, Kindt E, Delgado H, Todisco M, Hmani M, Mtibaa A, Abdelraheem M, Abad A, Teixeira F, Matrouf D, Gomez-Barrero M, Petrovska-Delacrétaz D, Chollet G, Evans N, Schneider T, Bonastre J, Raj B, Trancoso I and Busch C (2022). Preserving privacy in speaker and speech characterisation, Computer Speech and Language, 58:C, (441-480), Online publication date: 1-Nov-2019.
- Duan L, Li Y and Liao L Non-interactive Certificate Update Protocol for Efficient Authentication in IoT Proceedings of the 9th International Conference on the Internet of Things, (1-8)
- Radian R and Sattath O Semi-Quantum Money Proceedings of the 1st ACM Conference on Advances in Financial Technologies, (132-146)
- Lopez-Millan G, Marin-Lopez R and Pereniguez-Garcia F (2022). Towards a standard SDN-based IPsec management framework, Computer Standards & Interfaces, 66:C, Online publication date: 1-Oct-2019.
- Sudo H, Jimbo M, Nuida K and Shimizu K (2019). Secure Wavelet Matrix, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16:5, (1675-1684), Online publication date: 1-Sep-2019.
- Li X, Zhu Y, Wang J and Zhang J (2019). Efficient and secure multi-dimensional geometric range query over encrypted data in cloud, Journal of Parallel and Distributed Computing, 131:C, (44-54), Online publication date: 1-Sep-2019.
- El Shafie A, Al-Dhahir N, Ding Z and Hamila R (2019). On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes, IEEE Transactions on Wireless Communications, 18:8, (3948-3960), Online publication date: 1-Aug-2019.
- Hu W, Yao Y, Zhou D, Zheng Q and Choo K (2019). A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method, Mobile Networks and Applications, 24:4, (1317-1335), Online publication date: 1-Aug-2019.
- Xie Q, Hou Y, Cheng K, Dagher G, Wang L and Yu S Flexibly and Securely Shape Your Data Disclosed to Others Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, (160-167)
- Jiang H, Wang H, Zheng Z and Xu Q (2019). Privacy preserved wireless sensor location protocols based on mobile edge computing, Computers and Security, 84:C, (393-401), Online publication date: 1-Jul-2019.
- Dachman-Soled D, Gordon S, Liu F, O'neill A and Zhou H (2019). Leakage Resilience from Program Obfuscation, Journal of Cryptology, 32:3, (742-824), Online publication date: 1-Jul-2019.
- Ferretti L, Marchetti M and Colajanni M (2019). Fog-based Secure Communications for Low-power IoT Devices, ACM Transactions on Internet Technology, 19:2, (1-21), Online publication date: 31-May-2019.
- Gheorghiu A, Kapourniotis T and Kashefi E (2019). Verification of Quantum Computation, Theory of Computing Systems, 63:4, (715-808), Online publication date: 1-May-2019.
- Bogatov D, Kollios G and Reyzin L (2019). A comparative evaluation of order-revealing encryption schemes and secure range-query protocols, Proceedings of the VLDB Endowment, 12:8, (933-947), Online publication date: 1-Apr-2019.
- Choi S, Katz J, Schröder D, Yerukhimovich A and Zhou H (2019). (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, Journal of Cryptology, 32:2, (459-497), Online publication date: 1-Apr-2019.
- Zhou M, Wang Q, Ren K, Koutsonikolas D, Su L and Chen Y (2019). Dolphin, IEEE Transactions on Mobile Computing, 18:3, (560-573), Online publication date: 1-Mar-2019.
- Chang J, Ji Y, Xu M and Xue R (2019). General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding, Future Generation Computer Systems, 91:C, (416-425), Online publication date: 1-Feb-2019.
- Unruh D (2019). Quantum relational Hoare logic, Proceedings of the ACM on Programming Languages, 3:POPL, (1-31), Online publication date: 2-Jan-2019.
- Wang Q, Du M, Chen X, Chen Y, Zhou P, Chen X and Huang X (2018). Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training, IEEE Transactions on Knowledge and Data Engineering, 30:12, (2381-2393), Online publication date: 1-Dec-2018.
- Martins P, Sousa L and Mariano A (2017). A Survey on Fully Homomorphic Encryption, ACM Computing Surveys, 50:6, (1-33), Online publication date: 30-Nov-2018.
- Dziembowski S, Faust S and Hostáková K General State Channel Networks Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (949-966)
- Behnia R, Ozmen M, Yavuz A and Rosulek M TACHYON Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1855-1867)
- Vargas L, Hazarika G, Culpepper R, Butler K, Shrimpton T, Szajda D and Traynor P Mitigating Risk while Complying with Data Retention Laws Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (2011-2027)
- Fang S, Markwood I, Liu Y, Zhao S, Lu Z and Zhu H No Training Hurdles Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1747-1760)
- Li Y, Zhou F, Qin Y, Lin M and Xu Z (2018). Integrity-verifiable conjunctive keyword searchable encryption in cloud storage, International Journal of Information Security, 17:5, (549-568), Online publication date: 1-Oct-2018.
- Fujdiak R, Blazek P, Mikhaylov K, Malina L, Mlynek P, Misurec J and Blazek V On Track of Sigfox Confidentiality with End-to-End Encryption Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-6)
- Lin D, Hilbert N, Storer C, Jiang W and Fan J (2018). UFace, Computers and Security, 77:C, (627-641), Online publication date: 1-Aug-2018.
- Demertzis I, Talapatra R and Papamanthou C (2018). Efficient searchable encryption through compression, Proceedings of the VLDB Endowment, 11:11, (1729-1741), Online publication date: 1-Jul-2018.
- Canteaut A, Carpov S, Fontaine C, Lepoint T, Naya-Plasencia M, Paillier P and Sirdey R (2018). Stream Ciphers, Journal of Cryptology, 31:3, (885-916), Online publication date: 1-Jul-2018.
- Wang S, Dinh T, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Ooi B and Ruan P (2018). Forkbase, Proceedings of the VLDB Endowment, 11:10, (1137-1150), Online publication date: 1-Jun-2018.
- Dalskov A and Orlandi C Can You Trust Your Encrypted Cloud? Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (343-355)
- Bartolucci S, Bernat P and Joseph D SHARVOT Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, (30-34)
- Teruya T A Note on Subgroup Security in Pairing-Based Cryptography Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, (35-43)
- Yang K, Forte D and Tehranipoor M (2018). ReSC, ACM Transactions on Design Automation of Electronic Systems, 23:3, (1-27), Online publication date: 18-Apr-2018.
- Demertzis I, Papadopoulos S, Papapetrou O, Deligiannakis A, Garofalakis M and Papamanthou C (2018). Practical Private Range Search in Depth, ACM Transactions on Database Systems, 43:1, (1-52), Online publication date: 11-Apr-2018.
- Férée H, Hym S, Mayero M, Moyen J and Nowak D Formal proof of polynomial-time complexity with quasi-interpretations Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, (146-157)
- Jannati H and Bahrak B (2017). An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy, Wireless Personal Communications: An International Journal, 97:2, (3113-3123), Online publication date: 1-Nov-2017.
- Bellare M, Jaeger J and Len J Better Than Advertised Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (891-906)
- Li Y and Schäge S No-Match Attacks and Robust Partnering Definitions Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (1343-1360)
- Berndt S and Liśkiewicz M Algorithm Substitution Attacks from a Steganographic Perspective Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (1649-1660)
- Dang H, Huang Y and Chang E Evading Classifiers by Morphing in the Dark Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (119-133)
- Poh G, Chin J, Yau W, Choo K and Mohamad M (2017). Searchable Symmetric Encryption, ACM Computing Surveys, 50:3, (1-37), Online publication date: 9-Oct-2017.
- Chatterjee U, Chakraborty R and Mukhopadhyay D (2017). A PUF-Based Secure Communication Protocol for IoT, ACM Transactions on Embedded Computing Systems, 16:3, (1-25), Online publication date: 31-Aug-2017.
- Picek S Evolutionary computation and cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1066-1093)
- Xue K, Li S, Hong J, Xue Y, Yu N and Hong P (2017). Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving, IEEE Transactions on Information Forensics and Security, 12:7, (1596-1608), Online publication date: 1-Jul-2017.
- Wang W, Vong C, Yang Y and Wong P (2017). Encrypted image classification based on multilayer extreme learning machine, Multidimensional Systems and Signal Processing, 28:3, (851-865), Online publication date: 1-Jul-2017.
- Picek S, Sisejkovic D and Jakobovic D (2017). Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties, Engineering Applications of Artificial Intelligence, 62:C, (320-330), Online publication date: 1-Jun-2017.
- Ahmad M, Khurana S, Singh S and Alsharari H (2017). A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps, 3D Research, 8:2, (1-15), Online publication date: 1-Jun-2017.
- Demertzis I and Papamanthou C Fast Searchable Encryption With Tunable Locality Proceedings of the 2017 ACM International Conference on Management of Data, (1053-1067)
- Yang L, Huang G, Feng J and Xu L (2017). Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing, Information Sciences: an International Journal, 387:C, (254-265), Online publication date: 1-May-2017.
- Applebaum B, Avron J and Brzuska C (2017). Arithmetic Cryptography, Journal of the ACM, 64:2, (1-74), Online publication date: 30-Apr-2017.
- Song J, Yang F, Choo K, Zhuang Z and Wang L (2017). SIPF, ACM Transactions on Embedded Computing Systems, 16:2, (1-18), Online publication date: 14-Apr-2017.
- Hu G, Xiao D, Wang Y and Xiang T (2017). An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications, Journal of Visual Communication and Image Representation, 44:C, (116-127), Online publication date: 1-Apr-2017.
- Fuchsbauer G, Gay R, Kowalczyk L and Orlandi C Access Control Encryption for Equality, Comparison, and More Proceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 10175, (88-118)
- Baek J, Hableel E, Byon Y, Wong D, Jang K and Yeo H (2017). How to Protect ADS-B, IEEE Transactions on Intelligent Transportation Systems, 18:3, (690-700), Online publication date: 1-Mar-2017.
- Zhang Y, Xu C, Liang X, Li H, Mu Y and Zhang X (2017). Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation, IEEE Transactions on Information Forensics and Security, 12:3, (676-688), Online publication date: 1-Mar-2017.
- Hoang T, Yavuz A and Guajardo J Practical and secure dynamic searchable encryption via oblivious access on distributed data structure Proceedings of the 32nd Annual Conference on Computer Security Applications, (302-313)
- Zhou F, Li Y, Liu A, Lin M and Xu Z Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing Proceedings of the 10th International Conference on Provable Security - Volume 10005, (153-172)
- Jakobsen J and Orlandi C On the CCA (in)Security of MTProto Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, (113-116)
- Camenisch J, Enderlein R and Maurer U Memory Erasability Amplification Proceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 9841, (104-125)
- Baum C, Damgård I, Larsen K and Nielsen M How to Prove Knowledge of Small Secrets Proceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9816, (478-498)
- Picek S Evolutionary Computation and Cryptology Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (883-909)
- Dou Y, Zeng K, Li H, Yang Y, Gao B, Guan C, Ren K and Li S P2-SAS Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, (321-330)
- Kolokotronis N, Katsiotis A and Kalouptsidis N (2016). Secretly Pruned Convolutional Codes, IEEE Transactions on Information Forensics and Security, 11:7, (1500-1514), Online publication date: 1-Jul-2016.
- Canteaut A, Carpov S, Fontaine C, Lepoint T, Naya-Plasencia M, Paillier P and Sirdey R Stream Ciphers Revised Selected Papers of the 23rd International Conference on Fast Software Encryption - Volume 9783, (313-333)
- Ghali C, Schlosberg M, Tsudik G and Wood C Interest-Based Access Control for Content Centric Networks Proceedings of the 2nd ACM Conference on Information-Centric Networking, (147-156)
- Dinh T, Saxena P, Chang E, Ooi B and Zhang C M2R Proceedings of the 24th USENIX Conference on Security Symposium, (447-462)
- Papadopoulos S, Cormode G, Deligiannakis A and Garofalakis M (2014). Lightweight Query Authentication on Streams, ACM Transactions on Database Systems, 39:4, (1-45), Online publication date: 30-Dec-2015.
- Yang Z, Li J, Ren Y and Lee P Tunable Encrypted Deduplication with Attack-Resilient Key Management, ACM Transactions on Storage, 0:0
Index Terms
- Introduction to Modern Cryptography, Second Edition