-
1
-
-
84946837370
-
Key-privacy in public-key encryption
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
2
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption
-
IEEE Computer Society
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS, pp. 394-403. IEEE Computer Society (1997)
-
(1997)
FOCS
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3), 384-386 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
McEliece, R.2
Van Tilborg, H.3
-
4
-
-
84884477321
-
-
Personal communication May
-
Bernstein, D.J.: Personal communication (May 2012)
-
(2012)
-
-
Bernstein, D.J.1
-
5
-
-
84884488864
-
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: http://keccak.noekeon.org/
-
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
6
-
-
1842616017
-
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
-
Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM J. Comput. 33(1), 167-226 (2004)
-
(2004)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
78650835413
-
A Closer Look at Anonymity and Robustness in Encryption Schemes
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Mohassel, P.: A Closer Look at Anonymity and Robustness in Encryption Schemes. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 501-518. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 501-518
-
-
Mohassel, P.1
-
9
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
10
-
-
51349142711
-
Semantic security for the McEliece cryptosystem without random oracles
-
Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3), 289-305 (2008)
-
(2008)
Des. Codes Cryptography
, vol.49
, Issue.1-3
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
12
-
-
17144422244
-
A proposal for an ISO standard for public key encryption
-
version 2.1
-
Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1). IACR Cryptology ePrint Archive, 112 (2001)
-
(2001)
IACR Cryptology ePrint Archive
, pp. 112
-
-
Shoup, V.1
-
13
-
-
77954406052
-
A Timing Attack against the Secret Permutation in the McEliece PKC
-
Sendrier, N. (ed.) PQCrypto 2010. Springer, Heidelberg
-
Strenzke, F.: A Timing Attack against the Secret Permutation in the McEliece PKC. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 95-107. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6061
, pp. 95-107
-
-
Strenzke, F.1
-
14
-
-
56749169082
-
Side Channels in the McEliece PKC
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 216-229
-
-
Strenzke, F.1
Tews, E.2
Molter, H.G.3
Overbeck, R.4
Shoufan, A.5
-
15
-
-
38349028850
-
On the key-privacy issue of McEliece public-key encryption
-
Boztaş, S., Lu, H.-F(F.) (eds.) AAECC 2007. Springer, Heidelberg
-
Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key encryption. In: Boztaş, S., Lu, H.-F(F.) (eds.) AAECC 2007. LNCS, vol. 4851, pp. 168-177. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4851
, pp. 168-177
-
-
Yamakawa, S.1
Cui, Y.2
Kobara, K.3
Hagiwara, M.4
Imai, H.5
|