-
1
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
M. Bellare, A. Boldyreva and A. Palacio. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In EUROCRYPT 2004, LNCS 3027, pp. 171–188, 2004.
-
(2004)
EUROCRYPT 2004
, vol.LNCS 3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
2
-
-
20544449100
-
The One-More-RSA-Inversion Problems and the security of Chaum’s Blind Signature Scheme
-
M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko. The One-More-RSA-Inversion Problems and the security of Chaum’s Blind Signature Scheme. Journal of Cryptology, Vol. 16, No. 3, 2003, pp. 185-215.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, pp. 62–73, 1993. ACM Press.
-
(1993)
ACM CCS
, vol.93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
85025841649
-
Analysis of random oracle instantiation scenarios for OAEP and other practical schemes
-
A. Boldyreva and M. Fischlin. Analysis of random oracle instantiation scenarios for OAEP and other practical schemes. In CRYPTO 2005, LNCS 3493, pp. 412–429.
-
(2005)
CRYPTO
, vol.LNCS 3493
, pp. 412-429
-
-
Boldyreva, A.1
Fischlin, M.2
-
6
-
-
35048875340
-
On the random-oracle methodology as applied to length-restricted signature schemes
-
R. Canetti, O. Goldreich and S. Halevi. On the random-oracle methodology as applied to length-restricted signature schemes. In TCC 2004, LNCS 2951, pp. 40–57, 2004.
-
(2004)
TCC 2004
, vol.LNCS 2951
, pp. 40-57
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
7
-
-
84921068281
-
On the exact security of full domain hash
-
J-S. Coron. On the exact security of full domain hash. In CRYPTO 2000, LNCS 1880, pp. 229–235, 2000.
-
(2000)
CRYPTO 2000
, vol.LNCS 1880
, pp. 229-235
-
-
Coron, J.-S.1
-
8
-
-
51849112650
-
On the generic insecurity of the full domain hash
-
Y. Dodis, R. Oliveira and K. Pietrzak. On the generic insecurity of the full domain hash. In CRYPTO 2005, LNCS 3493, pp. 449–466, 2005.
-
(2005)
CRYPTO 2005
, vol.LNCS 3493
, pp. 449-466
-
-
Dodis, Y.1
Oliveira, R.2
Pietrzak, K.3
-
9
-
-
84978970262
-
An efficient existentially unforgeable signature scheme and its applications
-
C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications. In CRYPTO’94, LNCS 839, pp. 234–246,1994.
-
(1994)
CRYPTO’94
, vol.LNCS 839
, pp. 234-246
-
-
Dwork, C.1
Naor, M.2
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO’86, LNCS 263, pp. 186–194, 1987.
-
(1987)
CRYPTO’86
, vol.LNCS 263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Comp., 17(2):281–308, 1988.
-
(1988)
SIAM Journal on Comp
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
13
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
J. B. Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In CRYPTO 2002, LNCS 2442, pp. 111–126.
-
(2002)
CRYPTO
, vol.LNCS 2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
15
-
-
33646784002
-
Discrete-log-based signatures may not be equivalent to discrete log
-
P. Paillier and D. Vergnaud. Discrete-log-based signatures may not be equivalent to discrete log. In ASIACRYPT 2005, LNCS 3788, pp. 1–20, 2005.
-
(2005)
ASIACRYPT 2005
, vol.LNCS 3788
, pp. 1-20
-
-
Paillier, P.1
Vergnaud, D.2
-
16
-
-
77649259271
-
Trading one-wayness against chosen-ciphertext security in factoring-based encryption
-
P. Paillier and J. Villar. Trading one-wayness against chosen-ciphertext security in factoring-based encryption. In ASIACRYPT 06, LNCS 4284, pp. 252–266, 2006.
-
(2006)
ASIACRYPT 06
, vol.LNCS 4284
, pp. 252-266
-
-
Paillier, P.1
Villar, J.2
-
17
-
-
85025816431
-
-
RSA Data Security Inc., Sept
-
PKCS #1 v2.1: RSA cryptography standard (draft), document available at http://www.rsasecurity.com/rsalabs/pkcs/. RSA Data Security Inc., Sept. 2005.
-
(2005)
-
-
|