-
1
-
-
84947237328
-
On the Security of Joint Signature and Encryption
-
Advances in Cryptology, Proceedings of EUROCRYPT of, Springer-Verlag, Berlin
-
J. An, Y. Dodis and T. Rabin: On the Security of Joint Signature and Encryption, Advances in Cryptology - Proceedings of EUROCRYPT 2002, Vol. 2332 of LNCS, Springer-Verlag, Berlin, 2002, pages 83-107.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
33947504321
-
On the Security of Joint Signature and Encryption
-
Report 2002/046, Cryptology ePrint Archive, 2002
-
J. An, Y. Dodis and T. Rabin: On the Security of Joint Signature and Encryption, Report 2002/046, Cryptology ePrint Archive, 2002.
-
-
-
An, J.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
84958982846
-
Formal Proofs for the Security of Signcryption
-
Proceedings of Public Key Cryptography 2002 PKC 2002, of, Springer-Verlag, Berlin
-
J. Baek, R. Steinfeld and Y. Zheng: Formal Proofs for the Security of Signcryption, Proceedings of Public Key Cryptography 2002 (PKC 2002), Vol. 2274 of LNCS, Springer-Verlag, Berlin, 2002, pages 80-98.
-
(2002)
LNCS
, vol.2274
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
4
-
-
0031351741
-
A Concrete Security Treament of Symmetric Encryption
-
97, IEEE Computer Society Press, Los Alamitos, CA
-
M. Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treament of Symmetric Encryption, Proceedings of FOCS '97, IEEE Computer Society Press, Los Alamitos, CA, 1997, pages 394-403.
-
(1997)
Proceedings of FOCS
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology, Proceedings of CRYPTO '98, 1462 of, Springer-Verlag, Berlin
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway: Relations Among Notions of Security for Public-Key Encryption Schemes, Advances in Cryptology - Proceedings of CRYPTO '98, Vol. 1462 of LNCS, Springer-Verlag, Berlin, 1998, pages 26-45.
-
(1998)
LNCS
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
0003278940
-
Authenticated Enciyption: Relations Among Notions and Analysis of the Generic Composition Paradigm, Advances in Cryptology - Proceedings of ASIACRYPT
-
of, Springer-Verlag, Berlin
-
M. Bellare and C. Namprepre: Authenticated Enciyption: Relations Among Notions and Analysis of the Generic Composition Paradigm, Advances in Cryptology - Proceedings of ASIACRYPT 2000, Vol. 1976 of LNCS, Springer-Verlag, Berlin, 2000, pages 531-545.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprepre, C.2
-
8
-
-
84948986458
-
Optimal Asymmetric Encryption
-
Advances in Cryptology, Proceedings of Eurocrypt '94, 950 of, Springer-Verlag, Berlin
-
M. Bellare and P. Rogaway: Optimal Asymmetric Encryption, Advances in Cryptology - Proceedings of Eurocrypt '94, Vol. 950 of LNCS, Springer-Verlag, Berlin, 1994, pages 92-111.
-
(1994)
LNCS
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
33746324205
-
The Game-Playing Technique
-
Report 2004/331, International Association for Cryptographic Research (IACR) ePrint Archive
-
M. Bellare and P. Rogaway: The Game-Playing Technique, Report 2004/331, International Association for Cryptographic Research (IACR) ePrint Archive, 2004.
-
(2004)
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
-
Advances in Cryptology, Proceedings of CRYPTO '98, 1462 of, Springer-Verlag, Berlin
-
R. Cramer and V. Shoup: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack, Advances in Cryptology - Proceedings of CRYPTO '98, Vol. 1462 of LNCS, Springer-Verlag, Berlin, 1998, pages 13-25.
-
(1998)
LNCS
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
33947519900
-
-
R. Cramer and V. Shoup: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, Report 2001/108, International Association for Cryptographic Research (IACR) ePrint Archive, 2001.
-
R. Cramer and V. Shoup: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, Report 2001/108, International Association for Cryptographic Research (IACR) ePrint Archive, 2001.
-
-
-
-
12
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, Vol. 31, 1985, pages 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
13
-
-
84990731886
-
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
-
Proceedings of CRYPTO '86, 263 of, Springer-Verlag, Berlin
-
A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions of Identification and Signature Problems, Proceedings of CRYPTO '86, Vol. 263 of LNCS, Springer-Verlag, Berlin, 1987, pages 186-194.
-
(1987)
LNCS
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
14
-
-
84956859011
-
How to Enhance the Security of Public-Key Encryption at Minimum Cost
-
Proceedings of Public Key Cryptography '99 PKC '99, of, Springer-Verlag, Berlin
-
E. Fujisaki and T. Okamoto: How to Enhance the Security of Public-Key Encryption at Minimum Cost, Proceedings of Public Key Cryptography '99 (PKC '99), Vol. 1666 of LNCS, Springer-Verlag, Berlin, 1999, pages 53-68.
-
(1999)
LNCS
, vol.1666
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
0023985465
-
A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali and R. Rivest: A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, Vol. 17, No. 2, 1988, pages 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
17
-
-
84945137421
-
Encryption Modes with Almost Free Message Integrity
-
Advances in Cryptology, Proceedings of EUROCRYPT of, Springer-Verlag, Berlin
-
C. Jutla: Encryption Modes with Almost Free Message Integrity, Advances in Cryptology - Proceedings of EUROCRYPT 2001, Vol. 2045 of LNCS, Springer-Verlag, Berlin, 2001, pages 529-544.
-
(2001)
LNCS
, vol.2045
, pp. 529-544
-
-
Jutla, C.1
-
18
-
-
84880901653
-
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)
-
Advances in Cryptology, Proceedings of CRYPTO of, Springer-Verlag, Berlin
-
H. Krawczyk: The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?), Advances in Cryptology - Proceedings of CRYPTO 2001, Vol. 2139 of LNCS, Springer-Verlag, Berlin, 2001, pages 310-331.
-
(2001)
LNCS
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
20
-
-
84957705622
-
On Concrete Security Treatment of Signatures Derived from Identification
-
Advances in Cryptology, Proceedings of CRYPTO '98, 1462 of, Springer-Verlag, Berlin
-
K. Ohta and T. Okamoto: On Concrete Security Treatment of Signatures Derived from Identification, Advances in Cryptology - Proceedings of CRYPTO '98, Vol. 1462 of LNCS, Springer-Verlag, Berlin, 1998, pages 354-369.
-
(1998)
LNCS
, pp. 354-369
-
-
Ohta, K.1
Okamoto, T.2
-
21
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
Proceedings of Public Key Cryptography 2001 PKC 2001, of, Springer-Verlag, Berlin
-
T. Okamoto and D. Pointcheval: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes, Proceedings of Public Key Cryptography 2001 (PKC 2001), Vol. 1992 of LNCS, Springer-Verlag, Berlin, 2001, pages 104-118.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
22
-
-
84957795480
-
Chosen-Ciphertext Security for Any One-Way Cryptosystem
-
Proceedings of Public Key Cryptography 2000 PKC 2000, of, Springer-Verlag, Berlin
-
D. Pointcheval: Chosen-Ciphertext Security for Any One-Way Cryptosystem, Proceedings of Public Key Cryptography 2000 (PKC 2000), Vol. 1751 of LNCS, Springer-Verlag, Berlin, 2000, pages 129-146.
-
(2000)
LNCS
, vol.1751
, pp. 129-146
-
-
Pointcheval, D.1
-
23
-
-
0000901529
-
-
Springer-Verlag, Berlin
-
D. Pointcheval and J. Stern, Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, Vol. 13, No. 3, Springer-Verlag, Berlin, 2000, pages 361-396.
-
(2000)
Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
24
-
-
84974554584
-
Non-Interacitve Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Advances in Cryptology, Proceedings of CRYPTO '91, 576 of, Springer-Verlag, Berlin
-
C. Rackoff and D. Simon : Non-Interacitve Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, Advances in Cryptology - Proceedings of CRYPTO '91, Vol. 576 of LNCS, Springer-Verlag, Berlin, 1992, pages 433-444.
-
(1992)
LNCS
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
25
-
-
0035750947
-
OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption
-
P. Rogaway, M. Bellare, J. Black and T. Krovetz: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption, Proceedings of the 8th ACM Conference on Computer and Communications Security, 2001, pages 196-205.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
26
-
-
85032873931
-
Efficient Identification and Signatures for Smart Cards
-
Advances in Cryptology, Proceedings of CRYPTO '89, 435 of, Springer-Verlag, Berlin
-
C. P. Schnorr: Efficient Identification and Signatures for Smart Cards, Advances in Cryptology - Proceedings of CRYPTO '89, Vol. 435 of LNCS, Springer-Verlag, Berlin, 1990, pages 235-251.
-
(1990)
LNCS
, pp. 235-251
-
-
Schnorr, C.P.1
-
27
-
-
84937417404
-
Security of Signed ElGamal Encryption
-
Advances in Cryptology, Proceedings of ASIACRYPT of, Springer-Verlag, Berlin
-
C. P. Schnorr and M. Jakobsson: Security of Signed ElGamal Encryption, Advances in Cryptology - Proceedings of ASIACRYPT2000, Vol. 1976 of LNCS, Springer-Verlag, Berlin, 2000, pages 73-89.
-
(2000)
LNCS
, vol.1976
, pp. 73-89
-
-
Schnorr, C.P.1
Jakobsson, M.2
-
28
-
-
33745142417
-
Sequences of Games: A Tool for Taming Complexity in Security Proofs
-
Report 2004/332, International Association for Cryptographic Research (IACR) ePrint Archive
-
V. Shoup: Sequences of Games: A Tool for Taming Complexity in Security Proofs, Report 2004/332, International Association for Cryptographic Research (IACR) ePrint Archive, 2004.
-
(2004)
-
-
Shoup, V.1
-
29
-
-
84888872516
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
-
Advances in Cryptology, Proceedings of EUROCRYPT '98, 1403 of, Springer-Verlag, Berlin
-
V. Shoup and R. Gennaro: Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Advances in Cryptology - Proceedings of EUROCRYPT '98, Vol. 1403 of LNCS, Springer-Verlag, Berlin, 1998, pages 1-16.
-
(1998)
LNCS
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
31
-
-
84944242785
-
-
R. Steinfeld and Y. Zheng: A Signcryption Scheme Based on Integer Factorization, Proceedings of Information Security Workshop 2000 (ISW 2000), 1975 of LNCS, Springer-Verlag, Berlin, 2000, pages 308-322.
-
R. Steinfeld and Y. Zheng: A Signcryption Scheme Based on Integer Factorization, Proceedings of Information Security Workshop 2000 (ISW 2000), Vol. 1975 of LNCS, Springer-Verlag, Berlin, 2000, pages 308-322.
-
-
-
-
32
-
-
84958979582
-
On the Security of ElGamal-Based Encryption
-
Proceedings of Public Key Cryptography '98 PKC '98, of, Springer-Verlag, Berlin
-
Y. Tsiounis and M. Yung: On the Security of ElGamal-Based Encryption, Proceedings of Public Key Cryptography '98 (PKC '98), Vol. 1431 of LNCS, Springer-Verlag, Berlin, 1998, pages 117-134.
-
(1998)
LNCS
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
33
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption)
-
Advances in Cryptology, Proceedings CRYPTO '97, 1294 of, Springer-Verlag, Berlin
-
Y. Zheng: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption), Advances in Cryptology - Proceedings CRYPTO '97, Vol. 1294 of LNCS, Springer-Verlag, Berlin, 1997, pages 165-179.
-
(1997)
LNCS
, pp. 165-179
-
-
Zheng, Y.1
-
36
-
-
0027614629
-
-
Y. Zheng and J. Seberry: Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks, IEEE Journal on Selected Areas in Communications, 11, No. 5, 1993, pages 715-724 (Special Issue on Secure Communications).
-
Y. Zheng and J. Seberry: Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pages 715-724 (Special Issue on Secure Communications).
-
-
-
|