-
1
-
-
24944516264
-
Tag-KEM/DEM: A new frame-work for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
-
[AGKS05], EUROCRYPT'05
-
[AGKS05] M. Abe, R. Gennaro, K. Kurosawa and V. Shoup, Tag-KEM/DEM: A New Frame-work for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM, EUROCRYPT'05, LNCS 3494, 128-146, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
2
-
-
0032162672
-
Collusion secure fingerprinting for digital data
-
[BS98]
-
[BS98] D. Boneh and J. Shaw, Collusion secure fingerprinting for digital data, IEEE Transactions on Information Theory 44 (1998), 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
3
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
[CDHKS00], EUROCRYPT'00
-
[CDHKS00] R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz and A. Sahai, Exposure-resilient functions and all-or-nothing transforms, EUROCRYPT'00, LNCS 1807, 453-469, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
4
-
-
35248875326
-
Relaxing chosen ciphertext security
-
[CKN03], CRYPTO'03
-
[CKN03] R. Canetti, H. Krawczyk and J.B. Nielsen, Relaxing chosen ciphertext security, CRYPTO'03, LNCS 2729, 565-582, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
5
-
-
24944511263
-
Public traceability in traitor tracing schemes
-
[CPP05], EUROCRYPT'05
-
[CPP05] H. Chabanne, D.H. Phan and D. Pointcheval, Public traceability in traitor tracing schemes, EUROCRYPT'05, LNCS 3494, 542-558, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 542-558
-
-
Chabanne, H.1
Phan, D.H.2
Pointcheval, D.3
-
6
-
-
84985922619
-
Tracing traitor
-
[CFN94], CRYPTO'94
-
[CFN94] B. Chor, A. Fiat and M. Naor, Tracing traitor, CRYPTO'94, LNCS 839, 257-270, 1994.
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
[CS03]
-
[CS03] R. Cramer and V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM J. of Computing 33 (2003), 167-226.
-
(2003)
SIAM J. of Computing
, vol.33
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
84947273176
-
Traitor tracing with constant transmission rate
-
[KY02], EURO-CRYPT'02
-
[KY02] A. Kiayias and M. Yung, Traitor tracing with constant transmission rate, EURO-CRYPT'02, LNCS 2332, 450-465, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
10
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
[Riv97], FSE'97
-
[Riv97] R. Rivest, All-or-nothing encryption and the package transform, FSE'97, LNCS 1267, 210-218, 1997.
-
(1997)
LNCS
, vol.1267
, pp. 210-218
-
-
Rivest, R.1
-
12
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
[SW98]
-
[SW98] D.R. Stinson and R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics 11 (1998), 41-53.
-
(1998)
SIAM Journal on Discrete Mathematics
, vol.11
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
14
-
-
33645541516
-
Recursive constructions of secure codes and hash families using difference function families
-
[TS06]
-
[TS06] D. Tonien and R. Safavi-Naini, Recursive constructions of secure codes and hash families using difference function families, J. of Combinatorial Theory A 113 (4)(2006), 664-674.
-
(2006)
J. of Combinatorial Theory A
, vol.113
, Issue.4
, pp. 664-674
-
-
Tonien, D.1
Safavi-Naini, R.2
|