-
1
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Eurocrypt 2004, of, Springer-Verlag
-
M. Bellare, A. Boldyreva and A. Palacio. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In Eurocrypt 2004, Volume 3027 of LNCS, pp. 171-188. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
2
-
-
77649248690
-
Cryptology ePrint Archive, Report 2006/223
-
D. R. L. Brown. Unprovable Security of RSA-OAEP in the Standard Model. Cryptology ePrint Archive, Report 2006/223, 2006.
-
(2006)
-
-
Brown, D.R.L.1
-
3
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
CRYPTO '98, of, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In CRYPTO '98, Volume 1462 of LNCS, pp. 26-45. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM
-
M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In CCS '93, pp. 62-73. ACM, 1993.
-
(1993)
CCS '93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84948986458
-
Optimal asymmetric encryption - how to encrypt with RSA
-
Springer-Verlag
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with RSA. In Eurocrypt '94, Volume 950 of of LNCS, pp. 92-111. Springer-Verlag, 1995.
-
(1995)
Eurocrypt '94, Volume 950 of of LNCS
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
35048892549
-
Near-Collisions of SHA-0
-
CRYPTO' 2004, of, Springer-Verlag
-
E. Biham and R. Chen. Near-Collisions of SHA-0. In CRYPTO' 2004, Volume 3152 of LNCS, pp. 290-305. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
7
-
-
84957693225
-
-
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1, Springer-Verlag
-
D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. In CRYPTO '98, Volume 1462 of LNCS, pp. 1-12. Springer-Verlag, 1998.
-
(1998)
CRYPTO '98, Volume 1462 of LNCS
, pp. 1-12
-
-
Bleichenbacher, D.1
-
8
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
SIAM
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. Journal on Computing, Volume 13, pp. 850-864, SIAM, 1984.
-
(1984)
Journal on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
33745157897
-
Analysis of random-oracle instantiation scenarios for OAEP and other practical schemes
-
CRYPTO 2005, of, Springer-Verlag
-
A. Boldyreva and M. Fischlin. Analysis of random-oracle instantiation scenarios for OAEP and other practical schemes. In CRYPTO 2005, Volume 3621 of LNCS, pp. 412-429. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 412-429
-
-
Boldyreva, A.1
Fischlin, M.2
-
11
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
CRYPTO '97, of, Springer-Verlag
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In CRYPTO '97, Volume 1294 of LNCS. pp. 455-469. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
12
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM
-
R. Canetti, O. Goldreich and S. Halevi. The random oracle methodology, revisited. In STOC '98, pp. 209-218. ACM, 1998.
-
(1998)
STOC '98
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
0031624874
-
Perfectly one-way probabilistic hash functions
-
ACM
-
R. Canetti, D. Micciancio and O. Reingold. Perfectly one-way probabilistic hash functions. In STOC '98, pp. 131-140. ACM, 1998.
-
(1998)
STOC '98
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
14
-
-
33745155794
-
On the generic insecurity of full-domain hash
-
CRYPTO 2005, of, Springer-Verlag
-
Y. Dodis, R. Oliveira, and K. Pietrzak. On the generic insecurity of full-domain hash. In CRYPTO 2005, Volume 3621 of LNCS, pp. 449-466. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 449-466
-
-
Dodis, Y.1
Oliveira, R.2
Pietrzak, K.3
-
15
-
-
0343337504
-
Non-malleable cryptography
-
SIAM
-
D. Dolev, C. Dwork and M. Naor. Non-malleable cryptography. Journal on Computing, Vol. 30(2), pp. 391-437. SIAM, 2000.
-
(2000)
Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
84880853825
-
RSA-OAEP is secure under the RSA assumption
-
CRYPTO 2001, of, Springer-Verlag
-
E. Fujisaki, T. Okamoto, D. Pointcheval and J. Stern. RSA-OAEP is secure under the RSA assumption. In CRYPTO 2001, volume 2139 of LNCS, pp. 260-274. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
17
-
-
32844456747
-
On the (in)security of the Fiat-Shamir paradigm
-
IEEE
-
S. Goldwasser and Y. T. Kalai. On the (in)security of the Fiat-Shamir paradigm. In FOCS 2003. IEEE, 2003.
-
(2003)
FOCS 2003
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
18
-
-
77649240115
-
-
November 2005
-
IETF-TLS Working Group. Transport Layer Security. http://www.ietf.org/ html.charters/tls-charter.html, November 2005.
-
Group. Transport Layer Security
-
-
-
19
-
-
35048817517
-
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
-
TCC 2004, of, Springer-Verlag
-
U. Maurer, R. Renner and C. Holenstein. Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In TCC 2004, volume 2951 of LNCS, pp. 21-39. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 21-39
-
-
Maurer, U.1
Renner, R.2
Holenstein, C.3
-
20
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
CRYPTO 2002, of, Springer-Verlag
-
J. Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In CRYPTO 2002, volume 2442 of LNCS, pp. 111-126. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.1
-
21
-
-
33646784002
-
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
-
Asiacrypt 2005, of, Springer-Verlag
-
P. Paillier and D. Vergnaud. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. In Asiacrypt 2005, volume 3788 of LNCS, pp. 1-20. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3788
, pp. 1-20
-
-
Paillier, P.1
Vergnaud, D.2
-
22
-
-
0020301290
-
Theory and applications of trapdoor functions
-
IEEE
-
A. Yao. Theory and applications of trapdoor functions. In FOCS '82, pp. 80-91. IEEE, 1982.
-
(1982)
FOCS '82
, pp. 80-91
-
-
Yao, A.1
|