-
1
-
-
67650685950
-
Verifiable random functions from identity-based key encapsulation
-
Michel Abdalla, Dario Catalano, and Dario Fiore. Verifiable random functions from identity-based key encapsulation. In EUROCRYPT'09, pages 554-571, 2009.
-
(2009)
EUROCRYPT'09
, pp. 554-571
-
-
Abdalla, M.1
Catalano, D.2
Fiore, D.3
-
3
-
-
69949179634
-
Compact e-cash and simulatable vrfs revisited
-
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya. Compact e-cash and simulatable vrfs revisited. In Pairing'09, pages 114-131, 2009.
-
(2009)
Pairing'09
, pp. 114-131
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
4
-
-
33749544409
-
New proofs for NMAC and HMAC: Security without collision-resistance
-
Mihir Bellare. New proofs for NMAC and HMAC: Security without collision-resistance. In Crypto'06, pages 602-619, 2006.
-
(2006)
Crypto'06
, pp. 602-619
-
-
Bellare, M.1
-
5
-
-
35048891868
-
Keying hash functions for message authentication
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. In CRYPTO'96, pages 1-15, 1996.
-
(1996)
CRYPTO'96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Pseudorandom functions revisited: The cascade construction and its concrete security. In FOCS'96, 1996.
-
(1996)
FOCS'96
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
78650014533
-
-
Dan Bernstein. Syn cookies, 1996. http://cr.yp.to/syncookies.html.
-
(1996)
-
-
Bernstein, D.1
-
8
-
-
35048841300
-
Efficient selective-ID identity based encryption without random oracles
-
Advances in Cryptology EUROCRYPT 2004. Springer-Verlag
-
Dan Boneh and Xavier Boyen. Efficient selective-ID identity based encryption without random oracles. In Advances in Cryptology EUROCRYPT 2004, volume 3027 of LNCS, pages 223-38. Springer-Verlag, 2004.
-
LNCS
, vol.3027
, Issue.2004
, pp. 223-38
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Matt Franklin, editor, Advances in Cryptology CRYPTO. Springer-Verlag
-
Dan Boneh and Xavier Boyen. Secure identity based encryption without random oracles. In Matt Franklin, editor, Advances in Cryptology CRYPTO 2004, volume 3152 of LNCS, pages 443-59. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, Issue.2004
, pp. 443-59
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
35048848152
-
Short signatures without random oracles
-
Advances in Cryptology EUROCRYPT 2004. Springer-Verlag
-
Dan Boneh and Xavier Boyen. Short signatures without random oracles. In Advances in Cryptology EUROCRYPT 2004, volume 3027 of LNCS, pages 56-73. Springer-Verlag, 2004.
-
LNCS
, vol.3027
, Issue.2004
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
11
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology EUROCRYPT 2005. Springer-Verlag
-
Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. In Advances in Cryptology EUROCRYPT 2005, volume 3494 of LNCS. Springer-Verlag, 2005.
-
LNCS
, vol.3494
, pp. 2005
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
12
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology CRYPTO 2004. Springer
-
Dan Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Advances in Cryptology CRYPTO 2004, volume 3152 of LNCS, pages 41-55. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
13
-
-
51849118137
-
Circular-secure encryption from decision diffe-hellman
-
Dan Boneh, Shai Halevi, Michael Hamburg, and Rafail Ostrovsky. Circular-secure encryption from decision diffe-hellman. In CRYPTO'08, pages 108-125, 2008.
-
(2008)
CRYPTO'08
, pp. 108-125
-
-
Boneh, D.1
Halevi, S.2
Hamburg, M.3
Ostrovsky, R.4
-
14
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
15
-
-
38049112331
-
Simulatable VRFs with applications to multi-theorem NIZK
-
Melissa Chase and Anna Lysyanskaya. Simulatable VRFs with applications to multi-theorem NIZK. In CRYPTO'07, pages 303-322, 2007.
-
(2007)
CRYPTO'07
, pp. 303-322
-
-
Chase, M.1
Lysyanskaya, A.2
-
17
-
-
84958742006
-
Efficient construction of (distributed) verifiable random functions
-
Yevgeniy Dodis. Efficient construction of (distributed) verifiable random functions. In Public Key Cryptography, pages 1-17, 2003.
-
(2003)
Public Key Cryptography
, pp. 1-17
-
-
Dodis, Y.1
-
18
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Yevgeniy Dodis and Aleksandr Yampolskiy. A verifiable random function with short proofs and keys. In Public Key Cryptography, pages 416-431, 2005.
-
(2005)
Public Key Cryptography
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
19
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Michael Freedman, Yuval Ishai, Benny Pinkas, and Omer Reingold. Keyword search and oblivious pseudorandom functions. In TCC, pages 303-324, 2005.
-
(2005)
TCC
, pp. 303-324
-
-
Freedman, M.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
20
-
-
0022793132
-
How to construct random functions
-
Oded Goldreich, Shaff Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 34(4):792-807, 1986.
-
(1986)
J. ACM
, vol.34
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
21
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
Dennis Hofheinz and Eike Kiltz. Secure hybrid encryption from weakened key encapsulation. In CRYPTO'07, pages 553-571, 2007.
-
(2007)
CRYPTO'07
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
22
-
-
78650015962
-
Constructing verifiable random functions with large input spaces
-
Susan Hohenberger and Brent Waters. Constructing verifiable random functions with large input spaces. In Eurocrypto 2010, 2010.
-
(2010)
Eurocrypto 2010
-
-
Hohenberger, S.1
Waters, B.2
-
23
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
Stanislaw Jarecki and Xiaomin Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In TCC'09, pages 577-594, 2009.
-
(2009)
TCC'09
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
24
-
-
74049161603
-
Efficient pseudorandom functions from the decisional linear assumption and weaker variants
-
Allison Lewko and Brent Waters. Efficient pseudorandom functions from the decisional linear assumption and weaker variants. In ACM CCS, pages 112-120, 2009.
-
(2009)
ACM CCS
, pp. 112-120
-
-
Lewko, A.1
Waters, B.2
-
25
-
-
84937425161
-
Unique signatures and verifiable random functions from the DH-DDH separation
-
LNCS. Springer-Verlag
-
Anna Lysyanskaya. Unique signatures and verifiable random functions from the DH-DDH separation. In Advances in Cryptology CRYPTO 2002, LNCS. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology CRYPTO 2002
-
-
Lysyanskaya, A.1
-
26
-
-
0033346854
-
Verifiable random functions
-
Silvio Micali, Michael O. Rabin, and Salil P. Vadhan. Verifiable random functions. In FOCS, pages 120-130, 1999.
-
(1999)
FOCS
, pp. 120-130
-
-
Micali, S.1
Rabin, M.O.2
Vadhan, S.P.3
-
27
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
Victor Miller. The Weil pairing, and its efficient calculation. Journal of Cryptology, 17(4), 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
-
-
Miller, V.1
-
28
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudo-random functions. In FOCS'97, pages 458-67, 1997.
-
(1997)
FOCS'97
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
29
-
-
38049124394
-
A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
-
Report 2007/074
-
H. Shacham. A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074, 2007. http://eprint.iacr.org/.
-
(2007)
Cryptology EPrint Archive
-
-
Shacham, H.1
-
30
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Advances in Cryptology EUROCRYPT 2005. Springer-Verlag
-
Brent Waters. Efficient identity-based encryption without random oracles. In Advances in Cryptology EUROCRYPT 2005, volume 3494 of LNCS. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
-
-
Waters, B.1
|