-
1
-
-
70350302872
-
Smooth projective hashing for conditionally extractable commitments
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 671-689
-
-
Abdalla, M.1
Chevalier, C.2
Pointcheval, D.3
-
2
-
-
0842283854
-
Randomness Re-use in Multi-recipient Encryption Schemes
-
Public Key Cryptography - PKC 2003
-
Bellare, M., Boldyreva, A., Staddon, J.: Randomness re-use in multi-recipient encryption schemeas. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 85-99. Springer, Heidelberg (2002) (Pubitemid 36137130)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2567
, pp. 85-99
-
-
Bellare, M.1
Boldyreva, A.2
Staddon, J.3
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press May
-
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Security and Privacy, pp. 72-84. IEEE Computer Society Press (May 1992)
-
(1992)
1992 IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
84873940531
-
Efficient UC-secure authenticated key-exchange for algebraic languages
-
Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. Springer, Heidelberg
-
Ben Hamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: Efficient UC-secure authenticated key-exchange for algebraic languages. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 272-291. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7778
, pp. 272-291
-
-
Ben Hamouda, F.1
Blazy, O.2
Chevalier, C.3
Pointcheval, D.4
Vergnaud, D.5
-
6
-
-
84884467246
-
New smooth projective hash functions and one-round authenticated key exchange
-
Report 2013/034
-
Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: New smooth projective hash functions and one-round authenticated key exchange. Cryptology ePrint Archive, Report 2013/034 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Benhamouda, F.1
Blazy, O.2
Chevalier, C.3
Pointcheval, D.4
Vergnaud, D.5
-
7
-
-
84884479067
-
Trapdoor smooth projective hash functions
-
Report 2013/341
-
Benhamouda, F., Pointcheval, D.: Trapdoor smooth projective hash functions. Cryptology ePrint Archive, Report 2013/341 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Benhamouda, F.1
Pointcheval, D.2
-
8
-
-
79952504693
-
Signatures on randomizable ciphertexts
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Blazy, O., Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Signatures on randomizable ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 403-422. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 403-422
-
-
Blazy, O.1
Fuchsbauer, G.2
Pointcheval, D.3
Vergnaud, D.4
-
9
-
-
84858299538
-
Round-optimal privacy-preserving protocols with smooth projective hash functions
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Blazy, O., Pointcheval, D., Vergnaud, D.: Round-optimal privacy-preserving protocols with smooth projective hash functions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 94-111. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 94-111
-
-
Blazy, O.1
Pointcheval, D.2
Vergnaud, D.3
-
10
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
11
-
-
77956987281
-
Credential authenticated identification and key exchange
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Camenisch, J., Casati, N., Gross, T., Shoup, V.: Credential authenticated identification and key exchange. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 255-276. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 255-276
-
-
Camenisch, J.1
Casati, N.2
Gross, T.3
Shoup, V.4
-
12
-
-
82955184601
-
A framework for practical universally composable zero-knowledge protocols
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
Camenisch, J., Krenn, S., Shoup, V.: A framework for practical universally composable zero-knowledge protocols. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 449-467. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 449-467
-
-
Camenisch, J.1
Krenn, S.2
Shoup, V.3
-
13
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press October
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145. IEEE Computer Society Press (October 2001)
-
(2001)
42nd Annual Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
14
-
-
24944566824
-
Universally composable password-based key exchange
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005) (Pubitemid 41313966)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
15
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Advances in Cryptology - CRYPTO '98
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
18
-
-
32844472758
-
Strengthening zero-knowledge protocols using signatures
-
Garay, J.A., MacKenzie, P.D., Yang, K.: Strengthening zero-knowledge protocols using signatures. Journal of Cryptology 19(2), 169-209 (2006)
-
(2006)
Journal of Cryptology
, vol.19
, Issue.2
, pp. 169-209
-
-
Garay, J.A.1
MacKenzie, P.D.2
Yang, K.3
-
19
-
-
84873970560
-
Candidate multilinear maps from ideal lattices and applications
-
Report 2012/610
-
Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. Cryptology ePrint Archive, Report 2012/610 (2012), http://eprint.iacr.org/
-
(2012)
Cryptology ePrint Archive
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
-
20
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz
-
(2003)
LNCS
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
21
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
22
-
-
84861673398
-
Relatively-sound nIZKs and password-based key-exchange
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Jutla, C., Roy, A.: Relatively-sound nIZKs and password-based key-exchange. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 485-503. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 485-503
-
-
Jutla, C.1
Roy, A.2
-
23
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001) (Pubitemid 33275849)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
24
-
-
79953207657
-
Round-optimal password-based authenticated key exchange
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 293-310
-
-
Katz, J.1
Vaikuntanathan, V.2
-
25
-
-
84858324813
-
Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Libert, B., Yung, M.: Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 75-93. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 75-93
-
-
Libert, B.1
Yung, M.2
-
26
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM Press May
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd Annual ACM Symposium on Theory of Computing. ACM Press (May 1990)
-
(1990)
22nd Annual ACM Symposium on Theory of Computing
-
-
Naor, M.1
Yung, M.2
-
27
-
-
84861657933
-
Password-based authenticated key exchange (invited talk)
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Pointcheval, D.: Password-based authenticated key exchange (invited talk). In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 390-397. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 390-397
-
-
Pointcheval, D.1
-
28
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
IEEE Computer Society Press October
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Annual Symposium on Foundations of Computer Science, pp. 543-553. IEEE Computer Society Press (October 1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 543-553
-
-
Sahai, A.1
-
29
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|