-
1
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) LNCS Springer, Heidelberg
-
Adão, P., Bana, G., Herzog, J.C., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 374-396. Springer, Heidelberg (2005)
-
(2005)
ESORICS 2005
, vol.3679
, pp. 374-396
-
-
Adão, P.1
Bana, G.2
Herzog, J.C.3
Scedrov, A.4
-
2
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
Reingold, O. (ed.) LNCS Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
(2009)
TCC 2009
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
3
-
-
70350342511
-
-
Halevi (ed.) [18]
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi (ed.) [18], pp. 595-618
-
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
4
-
-
77954643565
-
Bounded key-dependent message security
-
Gilbert, H. (ed.) LNCS Springer, Heidelberg
-
Barak, B., Haitner, I., Hofheinz, D., Ishai, Y.: Bounded key-dependent message security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 423-444. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010
, vol.6110
, pp. 423-444
-
-
Barak, B.1
Haitner, I.2
Hofheinz, D.3
Ishai, Y.4
-
5
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Nyberg, K., Heys, H.M. (eds.) LNCS Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
-
(2003)
SAC 2002
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
6
-
-
51849118137
-
Circular-secure encryption from decision diffie-hellman
-
Wagner, D. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-secure encryption from decision diffie-hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 108-125
-
-
Boneh, D.1
Halevi, S.2
Hamburg, M.3
Ostrovsky, R.4
-
8
-
-
77954629285
-
-
Cryptology ePrint Archive, Report 2009/485
-
Brakerski, Z., Goldwasser, S., Kalai, Y.: Circular-secure encryption beyond affine functions. In: Cryptology ePrint Archive, Report 2009/485 (2009), http://eprint.iacr.org/
-
(2009)
Circular-Secure Encryption Beyond Affine Functions
-
-
Brakerski, Z.1
Goldwasser, S.2
Kalai, Y.3
-
9
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B. (ed.) LNCS Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EU-ROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
EU-ROCRYPT 2001
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R. (ed.) LNCS Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
Kim, K.-c. (ed.) LNCS Springer, Heidelberg
-
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
-
(2001)
PKC 2001
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
12
-
-
77949580684
-
Public-key encryption schemes with auxiliary inputs
-
Micciancio, D. (ed.) LNCS Springer, Heidelberg
-
Dodis, Y., Goldwasser, S., Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
-
(2010)
TCC 2010
, vol.5978
, pp. 361-381
-
-
Dodis, Y.1
Goldwasser, S.2
Kalai, Y.3
Peikert, C.4
Vaikuntanathan, V.5
-
13
-
-
70350674336
-
On cryptography with auxiliary input
-
Mitzenmacher, M. (ed.) ACM, New York
-
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) STOC, pp. 621-630. ACM, New York (2009)
-
(2009)
STOC
, pp. 621-630
-
-
Dodis, Y.1
Kalai, Y.T.2
Lovett, S.3
-
14
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
ACM, New York
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC, pp. 25-32. ACM, New York (1989)
-
(1989)
STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
15
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
ACM, New York
-
Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: STOC, pp. 365-377. ACM, New York (1982)
-
(1982)
STOC
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
17
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
van Oorschot, P.C. (ed.) USENIX Association
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 45-60. USENIX Association (2008)
-
(2008)
USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
18
-
-
77957006299
-
-
Halevi, S. (ed.) LNCS Springer, Heidelberg
-
Halevi, S. (ed.): CRYPTO 2009. LNCS, vol. 5677. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009
, vol.5677
-
-
-
19
-
-
77957013057
-
Lossy trapdoor functions from smooth homomor-phic hash proof systems
-
Hemenway, B., Ostrovsky, R.: Lossy trapdoor functions from smooth homomor-phic hash proof systems. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 16(127) (2009), http://eccc.uni-trier.de/report/2009/ 127/
-
(2009)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.16
, Issue.127
-
-
Hemenway, B.1
Ostrovsky, R.2
-
20
-
-
67650667958
-
A new randomness extraction paradigm for hybrid encryption
-
Joux, A. (ed.) LNCS Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2009
, vol.5479
, pp. 590-609
-
-
Kiltz, E.1
Pietrzak, K.2
Stam, M.3
Yung, M.4
-
21
-
-
35048855625
-
Sound computational interpretation of formal encryption with composed keys
-
Lim, J.-I., Lee, D.-H. (eds.) LNCS Springer, Heidelberg
-
Laud, P., Corin, R.: Sound computational interpretation of formal encryption with composed keys. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 55-66. Springer, Heidelberg (2004)
-
(2004)
ICISC 2003
, vol.2971
, pp. 55-66
-
-
Laud, P.1
Corin, R.2
-
23
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) LNCS Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
Ladner, R.E., Dwork, C. (eds.) ACM, New York
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) STOC, pp. 187-196. ACM, New York (2008)
-
(2008)
STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
25
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
Gabow, H.N., Fagin, R. (eds.) ACM, New York
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 84-93. ACM, New York (2005)
-
(2005)
STOC
, pp. 84-93
-
-
Regev, O.1
|