-
2
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
Qing, S, Gollmann, D, Zhou, J, eds, ICICS 2003, Springer, Heidelberg
-
Bao, F., Deng, R., Zhu, H.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2836
, pp. 301-312
-
-
Bao, F.1
Deng, R.2
Zhu, H.3
-
3
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
4
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. of Computing 13, 850-864 (1984)
-
(1984)
SIAM J. of Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
6
-
-
84958755223
-
Group Diffie-Hellman key exchange secure against dictionary attacks
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman key exchange secure against dictionary attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497-514. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
7
-
-
35248849912
-
-
Bresson, E., Chevassut, O., Pointcheval, D.: The group Diffie-Hellman problems. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 325-338. Springer, Heidelberg (2003)
-
Bresson, E., Chevassut, O., Pointcheval, D.: The group Diffie-Hellman problems. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 325-338. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
84948991087
-
-
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 275-286. Springer, Heidelberg (1995)
-
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
-
-
-
-
9
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
10
-
-
0001638393
-
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping
-
Coppersmith, D., Shparlinski, I..: On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. J. of Cryptology 13(2), 339-360 (2000)
-
(2000)
J. of Cryptology
, vol.13
, Issue.2
, pp. 339-360
-
-
Coppersmith, D.1
Shparlinski, I.2
-
11
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.: On the security of public key protocols. IEEE IT 29(12), 198-208 (1983)
-
(1983)
IEEE IT
, vol.29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
13
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE IT 31(4), 469-472 (1985)
-
(1985)
IEEE IT
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
14
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
15
-
-
84974681711
-
A tool box of cryptographic functions related to the Diffie-Hellman function
-
Kiltz, E.: A tool box of cryptographic functions related to the Diffie-Hellman function. In: Indocrypt '01, pp. 339-350 (2001)
-
(2001)
Indocrypt '01
, pp. 339-350
-
-
Kiltz, E.1
-
16
-
-
84955567079
-
Diffie-Hellman oracles
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Maurer, U., Wolf, S.: Diffie-Hellman oracles. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 268-282. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 268-282
-
-
Maurer, U.1
Wolf, S.2
-
17
-
-
38049154435
-
-
Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 245-263. Springer, Heidelberg (2005)
-
Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 245-263. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
0344875571
-
-
Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. J. of Computer Security. Preliminary version in WITS 2002 (2004)
-
Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. J. of Computer Security. Preliminary version in WITS 2002 (2004)
-
-
-
-
19
-
-
0031332843
-
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS '97, pp. 458-467 (1997)
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS '97, pp. 458-467 (1997)
-
-
-
-
20
-
-
84945137819
-
Assumptions related to discrete logarithms: Why subtleties make a real difference
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Sadeghi, A.-R., Steiner, M.: Assumptions related to discrete logarithms: Why subtleties make a real difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 244-261. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 244-261
-
-
Sadeghi, A.-R.1
Steiner, M.2
-
21
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
22
-
-
0037205807
-
-
x2. IPL 83(2), 109-113 (2002)
-
x2. IPL 83(2), 109-113 (2002)
-
-
-
-
23
-
-
0029720059
-
-
ACM CCS 96, pp, ACM Press, New York 1996
-
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: ACM CCS 96, pp. 31-37. ACM Press, New York (1996)
-
Diffie-Hellman key distribution extended to group communication
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|