• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial and International Advisory Board
    • Editorial Staff
    • Publication Ethics
    • Indexing and Abstracting
    • Related Links
    • FAQ
    • Peer Review Process
    • News
  • Guide for Authors
  • Submit Manuscript
  • Reviewers
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter Telegram
The ISC International Journal of Information Security
Articles in Press
Current Issue
Journal Archive
Volume Volume 10 (2018)
Volume Volume 9 (2017)
Volume Volume 8 (2016)
Volume Volume 7 (2015)
Volume Volume 6 (2014)
Volume Volume 5 (2013)
Volume Volume 4 (2012)
Volume Volume 3 (2011)
Issue Issue 2
Issue Issue 1
Volume Volume 2 (2010)
Volume Volume 1 (2009)
Rogaway, P. (2012). Constructing cryptographic definitions. The ISC International Journal of Information Security, 3(2), 69-76. doi: 10.22042/isecure.2015.3.2.2
P. Rogaway. "Constructing cryptographic definitions". The ISC International Journal of Information Security, 3, 2, 2012, 69-76. doi: 10.22042/isecure.2015.3.2.2
Rogaway, P. (2012). 'Constructing cryptographic definitions', The ISC International Journal of Information Security, 3(2), pp. 69-76. doi: 10.22042/isecure.2015.3.2.2
Rogaway, P. Constructing cryptographic definitions. The ISC International Journal of Information Security, 2012; 3(2): 69-76. doi: 10.22042/isecure.2015.3.2.2

Constructing cryptographic definitions

Article 2, Volume 3, Issue 2, Summer and Autumn 2011, Page 69-76  XML PDF (701 K)
Document Type: REVIEW PAPER
DOI: 10.22042/isecure.2015.3.2.2
Author
P. Rogaway
Abstract
This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are invented by man, not unearthed from the maws of scientific reality. The second theme is that definitions matter. They have been instrumental in changing the character of modern cryptography, and, I suspect, have the potential to change the character of other fields as well.
References

[1] Mihir Bellare. Practice-Oriented Provable Security. Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. Lecture Notes in Computer Science, vol. 1561, Springer, pp. 1-15, 1999.

[2] I. Damgård. A "Proof-Reading" of Some Issues in Cryptography. Automata, Languages and Programming, 34th International Colloquium, ICALP 2007. Lecture Notes in Computer Science, vol. 4596, Springer, pp. 2{11, 2007.

[3] O. Goldreich. Foundations of Cryptography - A Primer. Foundations and Trends in Theoretical Computer Science, vol. 1, no. 1, now publishers, pp. 1-116, 2005

Statistics
Article View: 7,305
PDF Download: 1,007
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

The ISC International Journal of Information Security is licensed under a
"Creative Commons Attribution 4.0 International (CC-BY 4.0)"

Live stats by GoStats.  Real Time Web Analytics

Journal Management System. Designed by sinaweb.