-
1
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Springer-Verlag
-
D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, " EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 223-238, 2004.
-
(2004)
EUROCRYPT 2004, LNCS 3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
34547313805
-
Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation
-
Full version available at
-
M. Bellare, T. Kohno, and V. Shoup, "Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation, " ACM CCS 2006. Full version available at http://eprint.iacr.org/2006/267.
-
ACM CCS 2006
-
-
Bellare, M.1
Kohno, T.2
Shoup, V.3
-
3
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
2000
-
M. Bellare, C. Namprempre, "Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, " ASIACRYPT 2000, pp. 531-545, 2000.
-
(2000)
ASIACRYPT
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing, " SIAM J. of Compt., Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Compt.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84921068281
-
On the exact security of full domain hash
-
Springer-Verlag
-
J. S. Coron, "On the exact security of Full Domain Hash", Proceedings of Crypto 2000, LNCS vol. 1880, Springer-Verlag, pp. 229-235, 2000.
-
(2000)
Proceedings of Crypto 2000, LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.S.1
-
7
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Springer-Verlag
-
R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme, " Eurocrypt 2003, LNCS Vol. 2656, Springer-Verlag, pp. 255-271, 2003.
-
(2003)
Eurocrypt 2003, LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
8
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer, V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, " SIAM J. of Comt., Vol. 33, pp. 167-226, 2003.
-
(2003)
SIAM J. of Comt.
, vol.33
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer-Verlag
-
E. Fujisaki, T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes", Proc. of Crypto '99, LNCS 1666, Springer-Verlag, pp. 537-554, 1999.
-
(1999)
Proc. of Crypto '99, LNCS 1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
10
-
-
26444618568
-
Boneh-franklin identity based encryption revisited
-
Full version available from the author's homepage
-
D. Galindo, "Boneh-Franklin Identity Based Encryption Revisited, " In ICALP'05, LNCS 3580, pp. 791-802, 2005. Full version available from the author's homepage: http://www.cs.ru.nl/dgalindo/ICALP2005fullpdf.
-
(2005)
ICALP'05, LNCS 3580
, pp. 791-802
-
-
Galindo, D.1
-
11
-
-
35048835796
-
A new paradigm of hybrid encryption scheme
-
K. Kurosawa and Y. Desmedt, "A New Paradigm of Hybrid Encryption Scheme, " CRYPTO 2004, pp. 426-442, 2004.
-
(2004)
CRYPTO 2004
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
-
12
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attack
-
V. Shoup, "Using hash functions as a hedge against chosen ciphertext attack, " Eurocrypt'00, pp. 275-288, 2000.
-
(2000)
Eurocrypt'00
, pp. 275-288
-
-
Shoup, V.1
-
13
-
-
77952378030
-
Sequences of games: A tool for taming complexity in security proofs
-
Available from
-
V. Shoup, "Sequences of games: a tool for taming complexity in security proofs, " manuscript, 2006. Available from http://www.shoup. net/papers/.
-
(2006)
Manuscript
-
-
Shoup, V.1
|