메뉴 건너뛰기




Volumn 2898, Issue , 2003, Pages 133-151

A designer's guide to KEMs

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL METHODS; PUBLIC KEY CRYPTOGRAPHY;

EID: 33646842805     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40974-8_12     Document Type: Article
Times cited : (86)

References (13)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • H. Krawczyk, editor, Advances in Cryptology - Crypto '98, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Advances in Cryptology - Crypto '98, LNCS 1462, pages 26-45. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 84937418785 scopus 로고    scopus 로고
    • Why textbook ElGamal and RSA encryption are insecure
    • T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000, Springer-Verlag
    • D. Boneh, A. Joux, and A. Nguyen. Why textbook ElGamal and RSA encryption are insecure. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2000, LNCS 1976, pages 30-43. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 30-43
    • Boneh, D.1    Joux, A.2    Nguyen, A.3
  • 6
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimal cost
    • H. Imai and Y. Zheng, editors, Public Key Cryptography, Springer-Verlag
    • E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimal cost. In H. Imai and Y. Zheng, editors, Public Key Cryptography, LNCS 1560, pages 53-68. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 7
    • 84937539109 scopus 로고    scopus 로고
    • On the power of misbehaving adversaries and security analysis of the original EPOC
    • D. Naccache, editor, Topics in Cryptography - CT-RSA 2001, Springer-Verlag
    • M. Joye, J. Quisquater, and M. Yung. On the power of misbehaving adversaries and security analysis of the original EPOC. In D. Naccache, editor, Topics in Cryptography - CT-RSA 2001, LNCS 2020, pages 208-222. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2020 , pp. 208-222
    • Joye, M.1    Quisquater, J.2    Yung, M.3
  • 8
    • 84958742582 scopus 로고    scopus 로고
    • A variant of the Cramer-Shoup cryptosystem for groups of unknown order
    • Y. Zheng, editor, Advances in Cryptology - Asiacrypt 2002, Springer-Verlag
    • S. Lucks. A variant of the Cramer-Shoup cryptosystem for groups of unknown order. In Y. Zheng, editor, Advances in Cryptology - Asiacrypt 2002, LNCS 2501, pages 27-45. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 27-45
    • Lucks, S.1
  • 10
    • 84937389342 scopus 로고    scopus 로고
    • The gap problems: A new class of problems for the security of cryptographic schemes
    • K. Kim, editor, Public Key Cryptography, Springer-Verlag
    • T. Okamoto and D. Pointcheval. The gap problems: A new class of problems for the security of cryptographic schemes. In K. Kim, editor, Public Key Cryptography, LNCS 1992, pages 104-118. Springer-Verlag, 2001.
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 11
    • 84937543435 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • D. Naccache, editor, Proceedings of CT-RSA 2001, Springer-Verlag
    • T. Okamoto and D. Pointcheval. REACT: Rapid enhanced-security asymmetric cryptosystem transform. In D. Naccache, editor, Proceedings of CT-RSA 2001, LNCS 2020, pages 159-175. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2020 , pp. 159-175
    • Okamoto, T.1    Pointcheval, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.