-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
de Capitani di Vimercati, S, Syverson, P.F, Gollmann, D, eds, ESORICS 2005, Springer, Heidelberg
-
Abão, P., Bana, G., Herzog, J., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 374-396. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 374-396
-
-
Abão, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
3
-
-
35048877673
-
Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles. In: Proceedings of CSF 2007
-
Los Alamitos
-
Backes, M., Pfitzmann, B., Scedrov, A.: Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles. In: Proceedings of CSF 2007, pp. 112-124. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
IEEE Computer Society Press
, pp. 112-124
-
-
Backes, M.1
Pfitzmann, B.2
Scedrov, A.3
-
4
-
-
1442292329
-
A composable cryptographic library with nested operations
-
ACM Press, New York 2003
-
Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: Proceedings of CCS 2003, pp. 220-230. ACM Press, New York (2003)
-
(2003)
Proceedings of CCS
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
5
-
-
0031351741
-
A concrete security treatment of symmetric encryption. In: Proceedings of FOCS 1997
-
Los Alamitos
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of FOCS 1997, pp. 394-403. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
IEEE Computer Society Press
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
6
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
7
-
-
35248822352
-
-
Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 62-75. Springer, Heidelberg (2003)
-
Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Pfitzmann, B, ed, EU-ROCRYPT 2001, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann, B. (ed.) EU-ROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
24144478829
-
-
Canetti, R., Halevi, S., Katz, J.: Adaptively-secure, non-interactive public-key encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 150-168. Springer, Heidelberg (2005)
-
Canetti, R., Halevi, S., Katz, J.: Adaptively-secure, non-interactive public-key encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 150-168. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
11
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.B.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.B.1
-
13
-
-
85028450627
-
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: Proceedings of STOC 1991, pp. 542-552. ACM Press, New York (1991)
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: Proceedings of STOC 1991, pp. 542-552. ACM Press, New York (1991)
-
-
-
-
15
-
-
4243148483
-
Magic functions
-
Dwork, C., Naor, M., Reingold, O., Stockmeyer, L.: Magic functions. Journal of the ACM 50(6), 852-921 (2003)
-
(2003)
Journal of the ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
17
-
-
61749103962
-
Security under key-dependent inputs
-
ACM Press, New York
-
Halevi, S., Krawczyk, H.: Security under key-dependent inputs. In: Proceedings of CCS 2007, ACM Press, New York (2007)
-
(2007)
Proceedings of CCS
-
-
Halevi, S.1
Krawczyk, H.2
-
18
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
19
-
-
28144434445
-
On modeling IND-CCA security in cryptographic protocols
-
Hofheinz, D., Müller-Quade, J., Steinwandt, R.: On modeling IND-CCA security in cryptographic protocols. Tatra Mountains Mathematical Publications 33, 83-97 (2006)
-
(2006)
Tatra Mountains Mathematical Publications
, vol.33
, pp. 83-97
-
-
Hofheinz, D.1
Müller-Quade, J.2
Steinwandt, R.3
-
20
-
-
35048899313
-
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
-
-
-
21
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
|