-
1
-
-
33745860457
-
DHAES: An encryption scheme based on Diffie-Hellman problem
-
M. Abdalla, M. Bellare, and P.Rogaway, "DHAES: An Encryption Scheme Based on Diffie-Hellman Problem," IEEE P1363a Submission, 1998, Available at http://grouper.ieee.org/groups/1363/ addendum.html.
-
(1998)
IEEE P1363a Submission
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, "Relations among Notions of Security for Public-key Encryption Schemes," In Advances in Cryptology - Proceedings of Crypto '98, LNCS 1462, Springer-Verlag, 1998, pp.26-45.
-
(1998)
In Advances in Cryptology - Proceedings of Crypto '98, LNCS 1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
84948986458
-
Optimal asymmetric encryption -how to encrypt with RSA
-
Springer-Verlag
-
M. Bellare and P. Rogaway, "Optimal Asymmetric Encryption -How to Encrypt with RSA," In Advances in Cryptology -Proceedings of Eurocrypt '94, LNCS 950, Springer-Verlag, 1995, pp. 92-111.
-
(1995)
In Advances in Cryptology -proceedings of Eurocrypt '94, LNCS 950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM
-
R. Canetti, O. Goldreich, and S. Halevi, "The Random Oracle Methodology, Revisited," Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM, 1998.
-
(1998)
Proceedings of the 30th Annual Symposium on the Theory of Computing
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
7
-
-
0032635116
-
Scalar multiplication on elliptic curves by frobenius expansions
-
March
-
J. Cheon, S. Park, C. Park, and S. Hahn, "Scalar Multiplication on Elliptic Curves by Frobenius Expansions," ETRI J., Vol. 21, No. 1, March 1999, pp. 27-38.
-
(1999)
ETRI J.
, vol.21
, Issue.1
, pp. 27-38
-
-
Cheon, J.1
Park, S.2
Park, C.3
Hahn, S.4
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Springer-Verlag
-
R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack," In Advances in Cryptology - Proceedings of Crypto '98, LNCS 1462, Springer-Verlag, 1998, pp. 13-25.
-
(1998)
In Advances in Cryptology - Proceedings of Crypto '98, LNCS 1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M.Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, IT-22(6), 1976, pp. 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
11
-
-
84874800178
-
A public key cryptosystems and a signature schems based on discrete logarithms
-
T. ElGamal, "A Public Key Cryptosystems and a Signature Schems Based on Discrete Logarithms," IEEE Transactions on Information Theory, IT-31(4), 1985, pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
12
-
-
84956859011
-
How to enhance the security of public-key encryption at minimum cost
-
Springer-Verlag
-
E. Fujisaki and T. Okamoto, "How to Enhance the Security of Public-key Encryption at Minimum Cost," PKC '99, LNCS 1560, Springer-Verlag, 1999, pp. 53-68.
-
(1999)
PKC '99, LNCS 1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer-Verlag
-
E. Fujisaki and T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes," In Advances in Cryptology - Proceedings of Crypto '99, LNCS 1666, Springer-Verlag, 1999, pp. 537-554.
-
(1999)
In Advances in Cryptology - Proceedings of Crypto '99, LNCS 1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
15
-
-
84957795480
-
Chosen-ciphertext security for any one-way cryptosystem
-
Springer-Verlag
-
D. Pointcheval, "Chosen-ciphertext Security for any One-way Cryptosystem," PKC '2000, LNCS 1751, Springer-Verlag, 2000, pp. 129-146.
-
(2000)
PKC '2000, LNCS 1751
, pp. 129-146
-
-
Pointcheval, D.1
-
16
-
-
84958979582
-
On the security of ElGamal based encryption
-
Springer-Verlag
-
Y. Tsiounis and M. Yung, "On the Security of ElGamal Based Encryption," PKC '98, LNCS 1431, Springer-Verlag, 1998, pp.117-134.
-
(1998)
PKC '98, LNCS 1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
17
-
-
85028933312
-
Practical approaches to attaining security against adaptively chosen ciphertext attacks
-
Springer-Verlag
-
Y. Zheng and J. Seberry, "Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks," In Advances in Cryptology - Proceedings of Crypto '92, LNCS 740, Springer-Verlag, 1993, pp. 292-304.
-
(1993)
In Advances in Cryptology - Proceedings of Crypto '92, LNCS 740
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
|