-
1
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Rueppel, R.A. (ed.) EUROCRYPT 1992. Springer, Heidelberg
-
Beaver, D., Haber, S.: Cryptographic protocols provably secure against dynamic adversaries. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 307-323. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
2
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology - CRYPTO '98
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998) (Pubitemid 128118995)
-
(1998)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
67650685947
-
Possibility and impossibility results for encryption and commitment secure under selective opening
-
EUROCRYPT 2009. Springer, Heidelberg
-
Bellare,M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 1-35
-
-
Hofheinz, D.1
Yilek, S.2
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
Blum, M.,Micali, S.:How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850-864 (1984)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing 36(5), 915-942 (2006)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 915-942
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press, Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, October 2001, pp. 136-145. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
42nd FOCS, October 2001
, pp. 136-145
-
-
Canetti, R.1
-
10
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM Press, New York
-
Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: 28th ACM STOC, pp. 639-648. ACM Press, New York (1996)
-
(1996)
28th ACM STOC
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
11
-
-
84958626761
-
Deniable encryption
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
12
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
13
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
14
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
84974602942
-
Improved non-committing encryption schemes based on general complexity assumptions
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Damg̊ard, I., Nielsen, J.B.: Improved non-committing encryption schemes based on general complexity assumptions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 432-450. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 432-450
-
-
Damg̊ard, I.1
Nielsen, J.B.2
-
16
-
-
0343337504
-
Nonmalleable cryptography
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal on Computing 30(2), 391-437 (2000)
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
17
-
-
4243148483
-
Magic functions
-
Dwork, C., Naor, M., Reingold, O., Stockmeyer, L.: Magic functions. Journal of the ACM 50(6), 852-921 (2003)
-
(2003)
Journal of the ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
20
-
-
77954651411
-
-
Cryptology ePrint Archive, Report 2009/088
-
Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security. Cryptology ePrint Archive, Report 2009/088 (2009)
-
(2009)
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
-
-
Hemenway, B.1
Libert, B.2
Ostrovsky, R.3
Vergnaud, D.4
-
22
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
23
-
-
67650677267
-
Practical chosen ciphertext secure encryption from factoring
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 313-332
-
-
Hofheinz, D.1
Kiltz, E.2
-
24
-
-
35048822047
-
Round-optimal secure two-party computation
-
Franklin,M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Katz, J., Ostrovsky, R.: Round-optimal secure two-party computation. In: Franklin,M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 335-354. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 335-354
-
-
Katz, J.1
Ostrovsky, R.2
-
25
-
-
67650667958
-
A new randomness extraction paradigm for hybrid encryption
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 590-609
-
-
Kiltz, E.1
Pietrzak, K.2
Stam, M.3
Yung, M.4
-
26
-
-
35048835796
-
A New Paradigm of Hybrid Encryption Scheme
-
Advances in Cryptology - CRYPTO 2004
-
Kurosawa, K., Desmedt, Y.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004) (Pubitemid 39138091)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
-
27
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM Press, New York
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd STOC. ACM Press, New York (1990)
-
(1990)
22nd STOC
-
-
Naor, M.1
Yung, M.2
-
28
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
29
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
ACM Press, New York
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: 40th STOC, pp. 187-196. ACM Press, New York (2008)
-
(2008)
40th STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
30
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
|