-
1
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
Alexi, W., Chor, B., Goldreich, O., Schnorr, C.-P.: RSA and Rabin functions: Certain parts are as hard as the whole. SIAM Journal on Computing 17(2), 194-209 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.-P.4
-
2
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
In: Ashby, V. (ed.), ACM Press, New York (1993)
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62-73. ACM Press, New York (1993)
-
(1993)
ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84948986458
-
Optimal asymmetric encryption
-
In: De Santis, A. (ed.). LNCS, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.950, pp. 92-111. Springer, Heidelberg (1995)
-
(1995)
EUROCRYPT 1994
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84957693225
-
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
-
Advances in Cryptology - CRYPTO '98
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 1-12. Springer, Heidelberg (1998) (Pubitemid 128118993)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
5
-
-
0022716288
-
SIMPLE UNPREDICTABLE PSEUDO-RANDOM NUMBER GENERATOR.
-
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364-383 (1986) (Pubitemid 16546557)
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Shub, M.2
Blum, M.3
-
6
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
In: Blakely, G.R., Chaum, D. (eds.) . LNCS, Springer, Heidelberg
-
Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.196, pp. 289-302. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984
, vol.196
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850-864 (1984)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
8
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Springer, Heidelberg, In: Cachin, C., Camenisch, J. L. (eds.). LNCS
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing 36(5), 915-942 (2006)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 915-942
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
10
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
DOI 10.1145/1102120.1102162, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identitybased techniques. In: ACM CCS 2005, pp. 320-329. ACM Press, New York (2005) (Pubitemid 44022015)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
11
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Camenisch, J.L., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003) (Pubitemid 137636939)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
12
-
-
4243180376
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
44449176564
-
The twin diffie-hellman problem and applications
-
DOI 10.1007/978-3-540-78967-3-8, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Cash, D.M., Kiltz, E., Shoup, V.: The twin diffie-hellman problem and applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.4965, pp. 127-145. Springer, Heidelberg (2008) (Pubitemid 351762827)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
14
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Springer, Heidelberg, In: Knudsen, L.R. (ed.). LNCS
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
85028450627
-
Non-malleable cryptography
-
ACM Press, New York (1991)
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: 23rd ACM STOC, pp. 542-552. ACM Press, New York (1991)
-
(1991)
23rd ACM STOC
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
17
-
-
0343337504
-
Nonmalleable cryptography
-
DOI 10.1137/S0097539795291562, PII S0097539795291562
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal on Computing 30(2), 391-437 (2000) (Pubitemid 32469583)
-
(2001)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
18
-
-
0011189534
-
Stronger security proofs for RSA and Rabin bits
-
Fischlin, R., Schnorr, C.-P.: Stronger security proofs for RSA and Rabin bits. Journal of Cryptology 13(2), 221-244 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.-P.2
-
19
-
-
33748310753
-
A framework for password-based authenticated key exchange
-
DOI 10.1145/1151414.1151418
-
Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. ACM Transactions on Information and System Security 9(2), 181-234 (2006) (Pubitemid 44329974)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.2
, pp. 181-234
-
-
Gennaro, R.1
Lindell, Y.2
-
21
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
ACM Press, New York (2004)
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, pp. 25-32. ACM Press, New York (1989)
-
(1989)
21st ACM STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
23
-
-
58349116541
-
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
-
In: Pieprzyk, J. (ed.). LNCS, Springer, Heidelberg (2008)
-
Hanaoka, G., Kurosawa, K.: Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, pp. 308-325. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008
, pp. 308-325
-
-
Hanaoka, G.1
Kurosawa, K.2
-
24
-
-
38049165151
-
-
Springer, Heidelberg, In: Menezes, A. (ed.). LNCS, CRYPTO 2007
-
Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 553-571. Springer, Heidelberg (2007)
-
(2007)
Secure hybrid encryption from weakened key encapsulation
, vol.4622
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
25
-
-
33745574075
-
Chosen-ciphertext security from tag-based encryption
-
DOI 10.1007/11681878-30, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.3876, pp. 581-600. Springer, Heidelberg (2006) (Pubitemid 43979869)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
-
26
-
-
38049077895
-
Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman
-
In: Okamoto, T., Wang, X. (eds.) . LNCS Springer, Heidelberg (2007)
-
Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.4450, pp. 282- 297. Springer, Heidelberg (2007)
-
(2007)
PKC 2007
, vol.4450
, pp. 282-297
-
-
Kiltz, E.1
-
27
-
-
84870677537
-
A new randomness extraction paradigm for hybrid encryption
-
In: Joux, A. (ed.) LNCS. Springer, Heidelberg (2009)
-
Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009
-
-
Kiltz, E.1
Pietrzak, K.2
Stam, M.3
Yung, M.4
-
28
-
-
35048835796
-
A new paradigm of hybrid encryption scheme
-
In: Franklin, M. (ed.). LNCS, Springer, Heidelberg (2004)
-
Kurosawa, K., Desmedt, Y.G.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 426-442. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.G.2
-
29
-
-
84958742582
-
A variant of the cramer-shoup cryptosystem for groups of unknown order
-
In: Zheng, Y. (ed.). LNCS, Springer, Heidelberg (2002)
-
Lucks, S.: A variant of the cramer-shoup cryptosystem for groups of unknown order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.2501, pp. 27-45. Springer, Heidelberg (2002)
-
(2002)
ASIACRYPT 2002
, vol.2501
, pp. 27-45
-
-
Lucks, S.1
-
30
-
-
0036588802
-
Pseudo-random functions and factoring
-
Naor, M., Reingold, O., Rosen, A.: Pseudo-random functions and factoring. SIAM Journal on Computing 31(5), 1383-1404 (2002)
-
(2002)
SIAM Journal on Computing
, vol.31
, Issue.5
, pp. 1383-1404
-
-
Naor, M.1
Reingold, O.2
Rosen, A.3
-
31
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM Press, New York (1990)
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC. ACM Press, New York (1990)
-
(1990)
22nd ACM STOC
-
-
Naor, M.1
Yung, M.2
-
32
-
-
77649259271
-
Trading one-wayness against chosen-ciphertext security in factoring-based encryption
-
In: Lai, X., Chen, K. (eds.) . LNCS, Springer, Heidelberg (2006)
-
Paillier, P., Villar, J.L.: Trading one-wayness against chosen-ciphertext security in factoring-based encryption. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 252-266. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 252-266
-
-
Paillier, P.1
Villar, J.L.2
-
33
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
In: Ladner, R.E., Dwork, C. (eds.), ACM Press, New York (2008)
-
Peikert, C.,Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 187-196. ACM Press, New York (2008)
-
(2008)
40th ACM STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
34
-
-
26444517444
-
About the security of ciphers (semantic security and pseudo-random permutations)
-
Phan, D.H., Pointcheval, D.: About the security of ciphers (Semantic security and pseudo-random permutations). In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.3357, pp. 182-197. Springer, Heidelberg (2004) (Pubitemid 39743822)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3357
, pp. 182-197
-
-
Phan, D.H.1
Pointcheval, D.2
-
35
-
-
0003614758
-
Digital signatures and public key functions as intractable as factorization
-
Massachusetts Institute of Technology (January 1979)
-
Rabin, M.O.: Digital signatures and public key functions as intractable as factorization. Technical Report MIT/LCS/TR-212, Massachusetts Institute of Technology (January 1979)
-
(1979)
Technical Report MIT/LCS/TR-212
-
-
Rabin, M.O.1
-
36
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
In: Feigenbaum, J. (ed.). LNCS, Springer, Heidelberg (1992)
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
37
-
-
84947431932
-
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
-
In: Batten, L.M., Seberry, J. (eds.) LNCS, Springer, Heidelberg (2002)
-
Reyzin, L., Reyzin, N.: Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.2384, pp. 144-154. Springer, Heidelberg (2002)
-
(2002)
ACISP 2002
, vol.2384
, pp. 144-154
-
-
Reyzin, L.1
Reyzin, N.2
-
38
-
-
0019080452
-
MODIFICATION OF THE RSA PUBLIC-KEY ENCRYPTION PROCEDURE.
-
Williams, H.C.: A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory 26(6), 726-729 (1980) (Pubitemid 11460687)
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
|