메뉴 건너뛰기




Volumn 7932 LNCS, Issue , 2013, Pages 174-187

Secure and anonymous hybrid encryption from coding theory

Author keywords

[No Author keywords available]

Indexed keywords

CODING THEORY; CRYPTOGRAPHIC COMMUNITY; CRYPTOGRAPHIC SCHEMES; HYBRID CONSTRUCTION; HYBRID ENCRYPTION; IND-CCA; NIEDERREITER; RANDOM ORACLE MODEL;

EID: 84884495820     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38616-9_12     Document Type: Conference Paper
Times cited : (26)

References (15)
  • 1
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key encryption
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 2
    • 0031351741 scopus 로고    scopus 로고
    • A Concrete Security Treatment of Symmetric Encryption
    • IEEE Computer Society
    • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS, pp. 394-403. IEEE Computer Society (1997)
    • (1997) FOCS , pp. 394-403
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 4
    • 84884477321 scopus 로고    scopus 로고
    • Personal communication May
    • Bernstein, D.J.: Personal communication (May 2012)
    • (2012)
    • Bernstein, D.J.1
  • 6
    • 1842616017 scopus 로고    scopus 로고
    • Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
    • Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM J. Comput. 33(1), 167-226 (2004)
    • (2004) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 8
    • 78650835413 scopus 로고    scopus 로고
    • A Closer Look at Anonymity and Robustness in Encryption Schemes
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Mohassel, P.: A Closer Look at Anonymity and Robustness in Encryption Schemes. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 501-518. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 501-518
    • Mohassel, P.1
  • 9
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 10
    • 51349142711 scopus 로고    scopus 로고
    • Semantic security for the McEliece cryptosystem without random oracles
    • Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3), 289-305 (2008)
    • (2008) Des. Codes Cryptography , vol.49 , Issue.1-3 , pp. 289-305
    • Nojima, R.1    Imai, H.2    Kobara, K.3    Morozov, K.4
  • 12
    • 17144422244 scopus 로고    scopus 로고
    • A proposal for an ISO standard for public key encryption
    • version 2.1
    • Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1). IACR Cryptology ePrint Archive, 112 (2001)
    • (2001) IACR Cryptology ePrint Archive , pp. 112
    • Shoup, V.1
  • 13
    • 77954406052 scopus 로고    scopus 로고
    • A Timing Attack against the Secret Permutation in the McEliece PKC
    • Sendrier, N. (ed.) PQCrypto 2010. Springer, Heidelberg
    • Strenzke, F.: A Timing Attack against the Secret Permutation in the McEliece PKC. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 95-107. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6061 , pp. 95-107
    • Strenzke, F.1
  • 14
    • 56749169082 scopus 로고    scopus 로고
    • Side Channels in the McEliece PKC
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 216-229
    • Strenzke, F.1    Tews, E.2    Molter, H.G.3    Overbeck, R.4    Shoufan, A.5
  • 15
    • 38349028850 scopus 로고    scopus 로고
    • On the key-privacy issue of McEliece public-key encryption
    • Boztaş, S., Lu, H.-F(F.) (eds.) AAECC 2007. Springer, Heidelberg
    • Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key encryption. In: Boztaş, S., Lu, H.-F(F.) (eds.) AAECC 2007. LNCS, vol. 4851, pp. 168-177. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4851 , pp. 168-177
    • Yamakawa, S.1    Cui, Y.2    Kobara, K.3    Hagiwara, M.4    Imai, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.