-
1
-
-
0343337504
-
Non-malleable cryptography
-
Earlier version at STOC '91
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. SIAM J. of Computing 30 (2000) 391-437 Earlier version at STOC '91.
-
(2000)
SIAM J. of Computing
, vol.30
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
2
-
-
0033342534
-
Non-malleable non-interactive zero-knowledge and adaptive chosenciphertext security
-
Sahai, A.: Non-malleable non-interactive zero-knowledge and adaptive chosenciphertext security. In: proceedings of FOCS '01. (2001) 543-553
-
(2001)
Proceedings of FOCS '01
, pp. 543-553
-
-
Sahai, A.1
-
3
-
-
84870707379
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
LNCS series
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. In: proceedings of CRYPTO '98, LNCS series, volume 1462. (1998) 13-25
-
(1998)
Proceedings of Crypto '98
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
4
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: proceedings of EUROCRYPT '02, LNCS series, volume 2332. (2002) 45-64
-
(2002)
Proceedings of Eurocrypt '02, Lncs Series
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
5
-
-
35248840513
-
A simpler construction of cca2-secure public-key encryption under general assumptions
-
Lindell, Y.: A simpler construction of cca2-secure public-key encryption under general assumptions. In: proceedings of EUROCRYPT '03, LNCS series, volume 2656. (2003) 241-254
-
(2003)
ProceedIngs Of Eurocrypt '03, Lncs Series
, vol.2656
, pp. 241-254
-
-
Lindell, Y.1
-
6
-
-
17144422244
-
A proposal for an iso standard for public key encryption
-
Shoup, V.: A proposal for an iso standard for public key encryption. Cryptology ePrint Archive, Report 2001/112 (2001) http://eprint.iacr.org/2001/ 212.
-
(2001)
Cryptology EPrint Archive, Report 2001/112
-
-
Shoup, V.1
-
7
-
-
84947237328
-
On the security of joint signature and encryption
-
An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: proceedings of EUROCRYPT '02, LNCS series, volume 2332. (2002) 83-107
-
(2002)
Proceedings of Eurocrypt '02, Lncs Series
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
8
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: proceedings of CRYPTO '03, LNCS series, volume 2729. (2003) 565-582
-
(2003)
Proceedings of CRYPTO '03, LNCS Series
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
9
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs 1
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs 1. In: proceedings of CRYPTO '98, LNCS series, volume 1462. (1998) 1-12
-
(1998)
Proceedings of CRYPTO '98, LNCS Series
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
10
-
-
84957059629
-
Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization
-
Bellare, M., Sahai, A.: Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. In: proceedings of CRYPTO '99, LNCS series, volume 1666. (1999) 519-536
-
(1999)
Proceedings of CRYPTO '99, LNCS Series
, vol.1666
, pp. 519-536
-
-
Bellare, M.1
Sahai, A.2
-
11
-
-
84955604812
-
Algorithms for black-box fields and their application to cryptography
-
Boneh, D., Lipton, R.J.: Algorithms for black-box fields and their application to cryptography. In: proceedings of CRYPTO '96, LNCS series, volume 1109. (1996) 283-297
-
(1996)
Proceedings of Crypto '96, Lncs Series
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.J.2
-
12
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: proceedings of EUROCRYPT '97, LNCS series, volume 1233. (1997) 256-266
-
(1997)
Proceedings of Eurocrypt '97, Lncs Series
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
13
-
-
84947214473
-
Generic lower bounds for root extraction and signature schemes in general groups
-
Damgård, I., Koprowski, M.: Generic lower bounds for root extraction and signature schemes in general groups. In: proceedings of EUROCRYPT '02, LNCS series, volume 2332. (2002) 256-271
-
(2002)
Proceedings of Eurocrypt '02, Lncs Series
, vol.2332
, pp. 256-271
-
-
Damgård, I.1
Koprowski, M.2
-
14
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: proceedings of STOC '90. (1990) 427-437
-
(1990)
Proceedings of STOC '90
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
15
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: proceedings of CRYPTO '98, LNCS series, volume 1462. (1998) 26-45
-
(1998)
Proceedings of CRYPTO '98, LNCS Series
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
|