-
1
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology-CRYPTO '98, Springer-Verlag, August
-
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology-CRYPTO '98, Lecture Notes in Computer Science 1462, pages 26-45. Springer-Verlag, August 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
0001868672
-
Optimal Asymmetric Encryption-How to Encrypt with RSA
-
Advances in Cryptology-Eurocrypt '94, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. Optimal Asymmetric Encryption-How to Encrypt with RSA. In Advances in Cryptology-Eurocrypt '94, Lecture Notes in Computer Science 950. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.950
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84957693225
-
-
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1, Springer-Verlag, August
-
Daniel Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1. In Advances in Cryptology-CRYPTO '98, Lecture Notes in Computer Science 1462, pages 1-12. Springer-Verlag, August 1998.
-
(1998)
Advances in Cryptology-CRYPTO '98, Lecture Notes in Computer Science 1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
6
-
-
0027610980
-
Modifications to the Number Field Sieve
-
Don Coppersmith. Modifications to the Number Field Sieve. Journal of Cryptology, 6(3):169-180, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.3
, pp. 169-180
-
-
Coppersmith, D.1
-
7
-
-
1842616017
-
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
-
Ronald Cramer and Victor Shoup. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing, 33(1):167-226, 2003.
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
77049128427
-
-
Roger Dingledine and Nick Mathewson. Tor Protocol Specification, version 1.112. http://tor.eff.org/cvs/tor/doc/tor-spec.txt, January 2006.
-
Roger Dingledine and Nick Mathewson. Tor Protocol Specification, version 1.112. http://tor.eff.org/cvs/tor/doc/tor-spec.txt, January 2006.
-
-
-
-
12
-
-
84880853825
-
RSAOAEP is Secure under the RSA Assumption
-
Springer-Verlag, August
-
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSAOAEP is Secure under the RSA Assumption. In Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139, pages 260-274. Springer-Verlag, August 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
14
-
-
77049123157
-
-
Jeffrey Hoffstein and Joseph H. Silverman. Reaction Attacks Against the NTRU Public Key Cryptosystem. NTRU Cryptosystems Technical Report #015, Version 2, http://www.ntru.com/cryptolab/pdf/NTRUTech015.pdf, June 2000.
-
Jeffrey Hoffstein and Joseph H. Silverman. Reaction Attacks Against the NTRU Public Key Cryptosystem. NTRU Cryptosystems Technical Report #015, Version 2, http://www.ntru.com/cryptolab/pdf/NTRUTech015.pdf, June 2000.
-
-
-
-
15
-
-
77049086969
-
-
Personal communication
-
Paul Syverson. Personal communication.
-
-
-
Syverson, P.1
-
16
-
-
77049098827
-
-
U.S. Department of Commerce, N.I.S.T. Secure Hash Algorithm. FIPS 180-1, 1995.
-
U.S. Department of Commerce, N.I.S.T. Secure Hash Algorithm. FIPS 180-1, 1995.
-
-
-
-
17
-
-
77049083562
-
-
U.S. Department of Commerce, N.I.S.T. Advanced Encryption Standard (AES). FIPS 197, 2001.
-
U.S. Department of Commerce, N.I.S.T. Advanced Encryption Standard (AES). FIPS 197, 2001.
-
-
-
|