-
1
-
-
58349093204
-
OAEP is secure under key-dependent messages
-
In: Pieprzyk,J. (ed.). LNCS, Springer, Heidelberg (2008)
-
Backes, M., Dürmuth, M., Unruh, D.: OAEP is secure under key-dependent messages. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.5350, pp. 506-523. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008
, vol.5350
, pp. 506-523
-
-
Backes, M.1
Dürmuth, M.2
Unruh, D.3
-
2
-
-
35048877673
-
Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles
-
DOI 10.1109/CSF.2007.23, 4271644, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
Backes, M., Pfitzmann, B., Scedrov, A.: Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles. In: CSF, pp. 112-124 (2007) (Pubitemid 47554209)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 112-124
-
-
Backes, M.1
Pfitzmann, B.2
Scedrov, A.3
-
3
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
In: Preneel, B. (ed.). LNCS, Springer, Heidelberg (2000)
-
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 259-274. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
4
-
-
84948986458
-
Optimal asymmetric encryption
-
In: De Santis,A. (ed.). LNCS, Springer, Heidelberg (1995)
-
Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.950, pp. 92-111. Springer, Heidelberg (1995)
-
(1995)
EUROCRYPT 1994
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Selected Areas in Cryptography, pp. 62-75 (2002)
-
(2002)
Selected Areas in Cryptography
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
6
-
-
84957693225
-
-
In: Krawczyk, H. (ed.). LNCS, CRYPTO 1998, Springer, Heidelberg (1998)
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 1-12. Springer, Heidelberg (1998)
-
(1998)
Chosen Ciphertext Attacks Against Protocols Based On The Rsa Encryption Standard Pkcs #1
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
7
-
-
0003153237
-
Non-interactive zero-knowledge and its applications (extended abstract)
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC 1988, pp. 103-112 (1988)
-
(1988)
STOC 1988
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
8
-
-
35048887476
-
Short group signatures
-
In: Franklin, M. (ed.). LNCS, Springer, Heidelberg (2004)
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
9
-
-
51849118137
-
Circular-secure encryption from decision diffie-hellman
-
In: Wagner, D. (ed.). LNCS, Springer, Heidelberg (2008)
-
Boneh, D., Halevi, S., Hamburg,M., Ostrovsky, R.: Circular-secure encryption from decision diffie-hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 108-125
-
-
Boneh, D.1
Halevi, S.2
Hamburg, M.3
Ostrovsky, R.4
-
10
-
-
84869520399
-
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
-
Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. Cryptology ePrint Archive, Report 2008/375 (2008), http://eprint.iacr. org/
-
(2008)
Cryptology ePrint Archive, Report 2008/375
-
-
Camenisch, J.1
Chandran, N.2
Shoup, V.3
-
11
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 93-118. Springer, Heidelberg (2001) (Pubitemid 33275827)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Camenisch, J.L., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003) (Pubitemid 137636939)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
13
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Advances in Cryptology - CRYPTO '98
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
14
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
In: Knudsen, L.R. (ed.). LNCS, Springer, Heidelberg (2002)
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.2332, p. 45. Springer, Heidelberg (2002), http://eprint.iacr.org/2001/085
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 45
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: STOC 1991, pp. 542-552 (1991)
-
(1991)
STOC 1991
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
0025855536
-
Multiple non-interactive zero knowledge proofs based on a single random string (extended abstract)
-
Feige, U., Lapidot, D., Shamir, A.: Multiple non-interactive zero knowledge proofs based on a single random string (extended abstract). In: FOCS 1990, pp. 308-317 (1990)
-
(1990)
FOCS 1990
, pp. 308-317
-
-
Feige, U.1
Lapidot, D.2
Shamir, A.3
-
17
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: STOC 1982, pp. 365-377 (1982)
-
(1982)
STOC 1982
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
18
-
-
77649262306
-
Simulation-sound NIZK proofs for a practical language and constant size group signatures
-
In: Lai, X., Chen, K. (eds.). LNCS, Springer, Heidelberg (2006)
-
Groth, J.: Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
19
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
DOI 10.1007/11761679-21, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 339-358. Springer, Heidelberg (2006) (Pubitemid 44072249)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
20
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
21
-
-
67650679185
-
On the (im)possibility of key dependent encryption
-
Haitner, I., Holenstein, T.: On the (im)possibility of key dependent encryption. In: TCC 2009 (2009)
-
(2009)
TCC 2009
-
-
Haitner, I.1
Holenstein, T.2
-
23
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
In: Menezes, A. (ed.). LNCS, Springer, Heidelberg (2007)
-
Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 553-571. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007
, vol.4622
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
24
-
-
44449114656
-
Towards key-dependent message security in the standard model
-
DOI 10.1007/978-3-540-78967-3-7, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Hofheinz, D., Unruh, D.: Towards key-dependent message security in the standard model. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.4965, pp. 108- 126. Springer, Heidelberg (2008) (Pubitemid 351762826)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 108-126
-
-
Hofheinz, D.1
Unruh, D.2
-
25
-
-
67650651840
-
-
Releases 2.53, 2.54, 3.20, 3.23, 3.24, 3.25, 3.27, and 3.30
-
IBM. IBM CCA Basic Services Reference and Guide for the IBM 4758 PCI and IBM 4764 PCI-X Cryptographic Coprocessors: Releases 2.53, 2.54, 3.20, 3.23, 3.24, 3.25, 3.27, and 3.30 (2008)
-
IBM CCA Basic Services Reference and Guide for the IBM 4758 PCI and IBM 4764 PCI-X Cryptographic Coprocessors
-
-
-
26
-
-
33745574075
-
Chosen-ciphertext security from tag-based encryption
-
DOI 10.1007/11681878-30, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.3876, pp. 581-600. Springer, Heidelberg (2006) (Pubitemid 43979869)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
-
27
-
-
38049077895
-
Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman
-
In: Okamoto, T., Wang, X. (eds.). LNCS, Springer, Heidelberg (2007)
-
Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.4450, pp. 282- 297. Springer, Heidelberg (2007)
-
(2007)
PKC 2007
, vol.4450
, pp. 282-297
-
-
Kiltz, E.1
-
28
-
-
84937578837
-
Another method for attaining security against adaptively chosen ciphertext attacks
-
In: Stinson, D.R. (ed.). LNCS, Springer, Heidelberg (1994)
-
Lim, C.H., Lee, P.J.: Another method for attaining security against adaptively chosen ciphertext attacks. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.773, pp. 420-434. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1993
, vol.773
, pp. 420-434
-
-
Lim, C.H.1
Lee, P.J.2
-
29
-
-
30744458170
-
Alternatives to Non-malleability: Definitions, Constructions, and Applications
-
Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
-
MacKenzie, P.D., Reiter, M.K., Yang, K.: Alternatives to non-malleability: Definitions, constructions, and applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol.2951, pp. 171-190. Springer, Heidelberg (2004) (Pubitemid 38236625)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2951
, pp. 171-190
-
-
MacKenzie, P.1
Reiter, M.K.2
Yang, K.3
-
30
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990, pp. 427-437 (1990) (Pubitemid 20729148)
-
(1990)
STOC 1990
, pp. 427-437
-
-
Naor Moni1
Yung Moti2
-
31
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
In: Feigenbaum, J. (ed.). LNCS, Springer, Heidelberg (1992)
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
32
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
DOI 10.1007/11761679-23, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 373-390. Springer, Heidelberg (2006) (Pubitemid 44072251)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
-
35
-
-
84880875026
-
Robust noninteractive zero knowledge
-
In: Kilian, J. (ed.) . LNCS, Springer, Heidelberg (2001)
-
De Santis, A., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Sahai, A.: Robust noninteractive zero knowledge. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 566-598. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001
, vol.2139
, pp. 566-598
-
-
Santis, D.A.1
Crescenzo, D.G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
36
-
-
38049124394
-
A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants
-
Shacham, H.: A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007), http://eprint.iacr.org/
-
(2007)
Cryptology ePrint Archive, Report 2007/074
-
-
Shacham, H.1
-
38
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Advances in Cryptology - EUROCRYPT '98
-
Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.1403, pp. 1-16. Springer, Heidelberg (1998) (Pubitemid 128081472)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
|