-
1
-
-
84947237328
-
On the Security of Joint Signatures and Enryption
-
Eurocrypt '02, Springer-Verlag, Berlin
-
J. H. An, Y. Dodis, and T. Rabin. On the Security of Joint Signatures and Enryption. In Eurocrypt '02, LNCS 2332, pages 83-107. Springer-Verlag, Berlin, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Crypto '98, Springer-Verlag, Berlin
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto '98, LNCS 1462, pages 26-45. Springer-Verlag, Berlin, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
63449086790
-
Authenticated Encryption: Notions and Constructions
-
Asiacrypt '00, Springer-Verlag, Berlin
-
M. Bellare and C. Namprempre. Authenticated Encryption: Notions and Constructions. In Asiacrypt '00, LNCS 1976. Springer-Verlag, Berlin, 2000.
-
(2000)
LNCS 1976
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
84937429718
-
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancies in Plaintexts for Efficient Cryptography
-
Asiacrypt '00, Springer-Verlag, Berlin
-
M. Bellare and P. Rogaway. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancies in Plaintexts for Efficient Cryptography. In Asiacrypt '00, LNCS 1976. Springer-Verlag, Berlin, 2000.
-
(2000)
LNCS 1976
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0027726717
-
Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols
-
ACM Press, New York
-
M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62-73. ACM Press, New York, 1993.
-
(1993)
Proc. of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84948986458
-
Optimal Asymmetric Encryption - How to Encrypt with RSA
-
Eurocrypt '94, Springer-Verlag, Berlin
-
M. Bellare and P. Rogaway. Optimal Asymmetric Encryption - How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, Berlin, 1995.
-
(1995)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84880853825
-
RSA-OAEP is Secure under the RSA Assumption
-
Crypto '01, Springer-Verlag, Berlin
-
E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. RSA-OAEP is Secure under the RSA Assumption. In Crypto '01, LNCS 2139, pages 260-274. Springer-Verlag, Berlin, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
10
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
63449102645
-
-
J. Pieprzyk and D. Pointcheval. Parallel Authentication and Public-Key Encryption. In ACISP '03, LNCS. Springer-Verlag, Berlin, 2003. Full version available from http://www.di.ens.fr/users/pointche/.
-
J. Pieprzyk and D. Pointcheval. Parallel Authentication and Public-Key Encryption. In ACISP '03, LNCS. Springer-Verlag, Berlin, 2003. Full version available from http://www.di.ens.fr/users/pointche/.
-
-
-
-
12
-
-
0017930809
-
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
-
-
-
13
-
-
84866580706
-
-
RSA Data Security, Inc, Available from
-
RSA Data Security, Inc. Public Key Cryptography Standards - PKCS. Available from http://www.rsa.com/rsalabs/pubs/PKCS/.
-
Public Key Cryptography Standards - PKCS
-
-
-
14
-
-
0018545449
-
How to Share a Secret
-
November
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
84880904783
-
Crypto '01
-
Springer-Verlag, Berlin
-
V. Shoup. OAEP Reconsidered. In Crypto '01, LNCS 2139, pages 239-259. Springer-Verlag, Berlin, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
Reconsidered, O.A.E.P.2
-
16
-
-
84937411969
-
Flaws in Applying Proof Methodologies to Signature Schemes
-
Crypto '02, Springer-Verlag, Berlin
-
J. Malone-Lee, D. Pointcheval, N. Smart, and J. Stern. Flaws in Applying Proof Methodologies to Signature Schemes. In Crypto '02, LNCS 2442, pages 93-110. Springer-Verlag, Berlin, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 93-110
-
-
Malone-Lee, J.1
Pointcheval, D.2
Smart, N.3
Stern, J.4
-
17
-
-
63449122349
-
Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption)
-
Crypto '97, Springer-Verlag, Berlin
-
Y. Zheng. Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption). In Crypto '97, LNCS 1294. Springer-Verlag, Berlin, 1997.
-
(1997)
LNCS
, vol.1294
-
-
Zheng, Y.1
|