-
1
-
-
84957069963
-
Robust distributed multiplication without interaction
-
Lecture Notes in Computer Science Springer Berlin
-
M. Abe, Robust distributed multiplication without interaction, in Advances in Cryptology-CRYPTO'99, ed. by M. Wiener. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, 1999), pp. 130-147
-
(1999)
Advances in Cryptology-CRYPTO'99
, vol.1666
, pp. 130-147
-
-
Abe, M.1
Wiener, M.2
-
3
-
-
24944516264
-
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
-
Lecture Notes in Computer Science Springer Berlin. Also available at IACR e-print 2005/027 and 2004/194
-
M. Abe, R. Gennaro, K. Kurosawa, V. Shoup, Tag-KEM/DEM: a new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM, in Advances in Cryptology-EUROCRYPT 2005, ed. by R. Cramer. Lecture Notes in Computer Science, vol. 3494 (Springer, Berlin, 2005), pp. 128-146. Also available at IACR e-print 2005/027 and 2004/194
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
Cramer, R.5
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Association for Computing Machinery
-
M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in First ACM Conference on Computer and Communication Security (Association for Computing Machinery, 1993), pp. 62-73
-
(1993)
First ACM Conference on Computer and Communication Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, pp. 1-10, 1988
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
Springer Berlin
-
D. Bleichenbacher, Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1, in Advances in Cryptology-CRYPTO'98, ed. by H. Krawczyk. Lecture Notes in Computer Science, vol. 1462 (Springer, Berlin, 1998), pp. 1-12
-
(1998)
Advances in Cryptology-CRYPTO'98 Lecture Notes in Computer Science 1462
, pp. 1-12
-
-
Bleichenbacher, D.1
Krawczyk, H.2
-
8
-
-
78650941074
-
Simplified OAEP for the RSA and Rabin functions
-
Lecture Notes in Computer Science Springer Berlin
-
D. Boneh, Simplified OAEP for the RSA and Rabin functions, in Advances in Cryptology-CRYPTO 2001, ed. by J. Killian. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 275-291
-
(2001)
Advances in Cryptology-CRYPTO 2001
, vol.2139
, pp. 275-291
-
-
Boneh, D.1
Killian, J.2
-
9
-
-
35048841300
-
Efficient selective-ID secure identity based encryption
-
Lecture Notes in Computer Science Springer Berlin
-
D. Boneh, X. Boyen, Efficient selective-ID secure identity based encryption, in Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027 (Springer, Berlin, 2004), pp. 223-238
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
11
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
ACM Also available at IACR e-print 2005/288
-
X. Boyen, Q. Mei, B. Waters, Direct chosen ciphertext security from identity-based techniques, in ACM Conference on Computer and Communications Security (ACM, 2005), pp. 320-329. Also available at IACR e-print 2005/288
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
12
-
-
33745655389
-
Chosen ciphertext secure public key threshold encryption without random oracles
-
Lecture Notes in Computer Science Springer Berlin
-
D. Boneh, X. Boyen, S. Halevi, Chosen ciphertext secure public key threshold encryption without random oracles, in Topics in Cryptology-CT-RSA 2006, ed. by T. Rabin, S. Halevi. Lecture Notes in Computer Science, vol. 3860 (Springer, Berlin, 2006), pp. 226-243
-
(2006)
Topics in Cryptology-CT-RSA 2006
, vol.3860
, pp. 226-243
-
-
Boneh, D.1
Boyen, X.2
Halevi, S.3
Rabin, T.4
Halevi, S.5
-
13
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
Lecture Notes in Computer Science Springer Berlin
-
R. Canetti, S. Goldwasser, An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack, in Advances in Cryptology-EUROCRYPT'99, ed. by J. Stern. Lecture Notes in Computer Science, vol. 1592 (Springer, Berlin, 1999), pp. 90-106
-
(1999)
Advances in Cryptology-EUROCRYPT'99
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
Stern, J.3
-
14
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Lecture Notes in Computer Science Springer Berlin. Also available at IACR ePrint archive 2003/174
-
R. Canetti, H. Krawczyk, J. Nielsen, Relaxing chosen-ciphertext security, in Advances in Cryptology-CRYPTO 2003, ed. by D. Boneh. Lecture Notes in Computer Science, vol. 2729 (Springer, Berlin, 2003), pp. 565-582. Also available at IACR ePrint archive 2003/174
-
(2003)
Advances in Cryptology-CRYPTO 2003
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.3
Boneh, D.4
-
15
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Lecture Notes in Computer Science Springer Berlin
-
R. Canetti, S. Halevi, J. Katz, Chosen-ciphertext security from identity-based encryption, in Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027 (Springer, Berlin, 2004), pp. 207-222
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
16
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Lecture Notes in Computer Science Springer Berlin
-
R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in Advances in Cryptology-CRYPTO'98, ed. by H. Krawczyk. Lecture Notes in Computer Science, vol. 1462 (Springer, Berlin, 1998), pp. 13-25
-
(1998)
Advances in Cryptology-CRYPTO'98
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
Krawczyk, H.3
-
17
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Lecture Notes in Computer Science Springer Berlin
-
R. Cramer, V. Shoup, Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption, in Advances in Cryptology-EUROCRYPTO 2002, ed. by L. Knudsen. Lecture Notes in Computer Science, vol. 2332 (Springer, Berlin, 2002), pp. 45-64
-
(2002)
Advances in Cryptology-EUROCRYPTO 2002
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
Knudsen, L.3
-
18
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
1
-
R. Cramer, V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167-226 (2003)
-
(2003)
SIAM J. Comput.
, vol.33
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
33646842805
-
A designer's guide to KEMs
-
Lecture Notes in Computer Science Springer Berlin
-
A. Dent, A designer's guide to KEMs, in 9th IMA International Conference on Cryptography and Coding, ed. by K.G. Paterson. Lecture Notes in Computer Science, vol. 2898 (Springer, Berlin, 2003), pp. 133-151
-
(2003)
9th IMA International Conference on Cryptography and Coding
, vol.2898
, pp. 133-151
-
-
Dent, A.1
Paterson, K.G.2
-
20
-
-
85023809951
-
Threshold cryptosystems
-
Lecture Notes in Computer Science Springer Berlin
-
Y.G. Desmedt, Y. Frankel, Threshold cryptosystems, in Advances in Cryptology-CRYPTO'89, ed. by G. Brassard. Lecture Notes in Computer Science, vol. 435 (Springer, Berlin, 1990), pp. 307-315
-
(1990)
Advances in Cryptology-CRYPTO'89
, vol.435
, pp. 307-315
-
-
Desmedt, Y.G.1
Frankel, Y.2
Brassard, G.3
-
22
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Lecture Notes in Computer Science Springer Berlin
-
E. Fujisaki, T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, in Advances in Cryptology-CRYPTO'99, ed. by M. Wiener. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, 1999), pp. 537-554
-
(1999)
Advances in Cryptology-CRYPTO'99
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
Wiener, M.3
-
24
-
-
35048859741
-
How to compress Rabin ciphertexts and signatures (and more)
-
Springer Berlin
-
C. Gentry, How to compress Rabin ciphertexts and signatures (and more), in Advances in Cryptology-CRYPTO 2004, ed. by M. Franklin. Lecture Notes in Computer Science, vol. 3152 (Springer, Berlin, 2004), pp. 179-200
-
(2004)
Advances in Cryptology-CRYPTO 2004 Lecture Notes in Computer Science 3152
, pp. 179-200
-
-
Gentry, C.1
Franklin, M.2
-
25
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
New York City
-
O. Goldreich, S. Micali, A. Wigderson, How to play any mental game or a completeness theorem for protocols with honest majority, in Proceedings of the 19th annual ACM Symposium on the Theory of Computing, New York City, pp. 218-229, 1987
-
(1987)
Proceedings of the 19th Annual ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
27
-
-
84948968753
-
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures (extended abstract)
-
Lecture Notes in Computer Science Springer Berlin
-
S. Jarecki, A. Lysyanskaya, Adaptively secure threshold cryptography: introducing concurrency, removing erasures (extended abstract), in Advances in Cryptology-EUROCRYPT 2000. Lecture Notes in Computer Science, vol. 1807 (Springer, Berlin, 2000), pp. 221-242
-
(2000)
Advances in Cryptology-EUROCRYPT 2000
, vol.1807
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
-
28
-
-
33745574075
-
Chosen-ciphertext security from tag-based encryption
-
Lecture Notes in Computer Science Springer Berlin
-
E. Kiltz, Chosen-ciphertext security from tag-based encryption, in Theory of Cryptography-TCC'06, ed. by S. Halevi, T. Rabin. Lecture Notes in Computer Science, vol. 3876 (Springer, Berlin, 2006), pp. 581-600
-
(2006)
Theory of Cryptography-TCC'06
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
Halevi, S.2
Rabin, T.3
-
29
-
-
35048835796
-
A new paradigm of hybrid encryption scheme
-
Lecture Notes in Computer Science Springer Berlin
-
K. Kurosawa, Y. Desmedt, A new paradigm of hybrid encryption scheme, in Advances in Cryptology-CRYPTO 2004, ed. by M. Franklin. Lecture Notes in Computer Science, vol. 3152 (Springer, Berlin, 2004), pp. 426-442
-
(2004)
Advances in Cryptology-CRYPTO 2004
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
Franklin, M.3
-
30
-
-
30744458170
-
Alternatives to non-malleability: Definitions, constructions, and applications
-
Lecture Notes in Computer Science Springer Berlin
-
P. MacKenzie, M.K. Reiter, K. Yang, Alternatives to non-malleability: definitions, constructions, and applications, in Theory of Cryptography-TCC'04, ed. by M. Naor. Lecture Notes in Computer Science, vol. 2951 (Springer, Berlin, 2004), pp. 171-190
-
(2004)
Theory of Cryptography-TCC'04
, vol.2951
, pp. 171-190
-
-
MacKenzie, P.1
Reiter, M.K.2
Yang, K.3
Naor, M.4
-
31
-
-
24144473586
-
A universally composable secure channel based on the KEM-DEM framework
-
Lecture Notes in Computer Science Springer Berlin
-
W. Nagao, Y. Manabe, T. Okamoto, A universally composable secure channel based on the KEM-DEM framework, in Theory of Cryptography-TCC'05. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 426-444
-
(2005)
Theory of Cryptography-TCC'05
, vol.3378
, pp. 426-444
-
-
Nagao, W.1
Manabe, Y.2
Okamoto, T.3
-
33
-
-
14844330007
-
REACT: Rapid enhanced-security asymmetric cryptosystem transform
-
Lecture Notes in Computer Science Springer Berlin
-
T. Okamoto, D. Pointcheval, REACT: Rapid enhanced-security asymmetric cryptosystem transform, in RSA'2001. Lecture Notes in Computer Science (Springer, Berlin, 2001)
-
(2001)
RSA'2001
-
-
Okamoto, T.1
Pointcheval, D.2
-
34
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Lecture Notes in Computer Science Springer Berlin
-
C. Rackoff, D. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, in Advances in Cryptology-CRYPTO'91. Lecture Notes in Computer Science, vol. 576 (Springer, Berlin, 1992), pp. 433-444
-
(1992)
Advances in Cryptology-CRYPTO'91
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
35
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attack
-
Lecture Notes in Computer Science Springer Berlin
-
V. Shoup, Using hash functions as a hedge against chosen ciphertext attack, in Advances in Cryptology-EUROCRYPT 2000. Lecture Notes in Computer Science, vol. 1807 (Springer, Berlin, 2000), pp. 275-288
-
(2000)
Advances in Cryptology-EUROCRYPT 2000
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
36
-
-
84880904783
-
OAEP reconsidered
-
Lecture Notes in Computer Science Springer Berlin
-
V. Shoup, OAEP reconsidered, in Advances in Cryptology-CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 239-259
-
(2001)
Advances in Cryptology-CRYPTO 2001
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
-
38
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
2
-
V. Shoup, R. Gennaro, Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptol. 15(2), 75-96 (2002)
-
(2002)
J. Cryptol.
, vol.15
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
|