-
1
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Proc. Of Crypto ’98, LNCS 1462, pages 26–45. Springer-Verlag, 1998
-
(1998)
Proc. Of Crypto ’98, LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
84948986458
-
Optimal Asymmetric Encryption
-
Springer-Verlag
-
M. Bellare and P. Rogaway. Optimal Asymmetric Encryption. In Proc. Of Eurocrypt ’94, LNCS 950, pages 92–111. Springer-Verlag, 1995
-
(1995)
Proc. Of Eurocrypt ’94, LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84937483916
-
-
NTRU CryptosystemsTechnical reports
-
NTRU Cryptosystems. Technical reports available at http://www.ntru.com. 2002
-
(2002)
-
-
-
5
-
-
0343337504
-
Non-Malleable Cryptography
-
D. Dolev, C. Dwork, and M. Naor. Non-Malleable Cryptography. SIAM Journal on Computing, 30(2):391–437, 2000
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
7
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
Springer- Verlag
-
E. Fujisaki and T. Okamoto. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In Proc. Of Crypto ’99, LNCS 1666, pages 537–554. Springer- Verlag, 1999
-
(1999)
Proc. Of Crypto ’99, LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
8
-
-
0033908504
-
How to Enhance the Security of Public-Key Encryption at Minimum Cost
-
Special issue on cryptography and information security
-
E. Fujisaki and T. Okamoto. How to Enhance the Security of Public-Key Encryption at Minimum Cost. IEICE Trans. Fundamentals of Electronics, Comunications and Computer Sciences, E83-A(1), 2000. Special issue on cryptography and information security.
-
(2000)
IEICE Trans. Fundamentals of Electronics, Comunications and Computer Sciences
, vol.E83-A
, Issue.1
-
-
Fujisaki, E.1
Okamoto, T.2
-
9
-
-
84880853825
-
RSA–OAEP is Secure under the RSA Assumption
-
Springer-Verlag
-
E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. RSA–OAEP is Secure under the RSA Assumption. In Proc. Of Crypto ’01, LNCS 2139, pages 260–274. Springer-Verlag, 2001
-
(2001)
Proc. Of Crypto ’01, LNCS
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
10
-
-
84945126587
-
Key Recovery and Message Attacks on NTRU-Composite
-
C. Gentry. Key Recovery and Message Attacks on NTRU-Composite. In Proc. Of Eurocrypt ’01, LNCS 2045, pages 182–194. Springer-Verlag, 2001
-
(2001)
Proc. Of Eurocrypt ’01, LNCS
, vol.2045
, pp. 182-194
-
-
Gentry, C.1
-
12
-
-
84958629363
-
Reaction Attacks against Several Public-Key Cryptosystems
-
C. Hall, I. Goldberg, and B. Schneier. Reaction Attacks against Several Public-Key Cryptosystems. In Proc. Of ICICS ’99, LNCS, pages 2–12. Springer-Verlag, 1999
-
(1999)
Proc. Of ICICS ’99, LNCS
, pp. 2-12
-
-
Hall, C.1
Goldberg, I.2
Schneier, B.3
-
13
-
-
84947808606
-
NTRU: A Ring based Public Key Cryptosystem
-
Springer-Verlag First presented at the rump session of Crypto ’96
-
J. Hoffstein, J. Pipher, and J.H. Silverman. NTRU: a Ring based Public Key Cryptosystem. In Proc. Of ANTS III, LNCS 1423, pages 267–288 Springer-Verlag, 1998. First presented at the rump session of Crypto ’96
-
(1998)
Proc. Of ANTS III, LNCS
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
20
-
-
34250244723
-
Factoring Polynomials with Rational Coefficients
-
A. K. Lenstra, H. W. Lenstra, and L. Lovàsz. Factoring Polynomials with Rational Coefficients. Mathematische Ann., 261:513–534, 1982
-
(1982)
Mathematische Ann
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovàsz, L.3
-
21
-
-
84958959970
-
Dimension Reduction Methods for Convolution Modular Lattices
-
Springer-Verlag
-
A. May and J. H. Silverman. Dimension Reduction Methods for Convolution Modular Lattices. In Proc. Of CALC ’01, LNCS 2146. Springer-Verlag, 2001
-
(2001)
Proc. Of CALC ’01, LNCS
, vol.2146
-
-
May, A.1
Silverman, J.H.2
-
22
-
-
84958950822
-
Improving Lattice-based Cryptosystems using the Hermite Normal Form
-
Springer-Verlag
-
D. Micciancio. Improving Lattice-based Cryptosystems using the Hermite Normal Form. In Proc. Of CALC ’01, LNCS 2146. Springer-Verlag, 2001
-
(2001)
Proc. Of CALC ’01, LNCS
, vol.2146
-
-
Micciancio, D.1
-
23
-
-
0024983231
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
-
M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In Proc. Of the 22nd STOC, pages 427–437. ACM Press, 1990
-
(1990)
Proc. Of the 22Nd STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
24
-
-
33846867921
-
The Two Faces of Lattices in Cryptology
-
Springer-Verlag
-
P. Q. Nguyen and J. Stern. The Two Faces of Lattices in Cryptology. In Proc. Of CALC ’01, LNCS 2146. Springer-Verlag, 2001
-
(2001)
Proc. Of CALC ’01, LNCS
, vol.2146
-
-
Nguyen, P.Q.1
Stern, J.2
-
25
-
-
84937543435
-
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform
-
Springer-Verlag
-
T. Okamoto and D. Pointcheval. REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform. In Proc. Of CT-RSA ’01, LNCS 2020, pages 159–175. Springer-Verlag, 2001
-
(2001)
Proc. Of CT-RSA ’01, LNCS
, vol.2020
, pp. 159-175
-
-
Okamoto, T.1
Pointcheval, D.2
-
26
-
-
84957795480
-
Chosen-Ciphertext Security for any One-Way Cryptosystem
-
Springer-Verlag
-
D. Pointcheval. Chosen-Ciphertext Security for any One-Way Cryptosystem. In Proc. Of PKC ’00, LNCS 1751, pages 129–146. Springer-Verlag, 2000
-
(2000)
Proc. Of PKC ’00, LNCS
, vol.1751
, pp. 129-146
-
-
Pointcheval, D.1
-
27
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Springer-Verlag
-
C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Proc. Of Crypto ’91, LNCS 576, pages 433–444. Springer-Verlag, 1992
-
(1992)
Proc. Of Crypto ’91, LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
28
-
-
0023532388
-
A Hierarchy of Polynomial Lattice Basis Reduction Algorithms
-
C. P. Schnorr. A Hierarchy of Polynomial Lattice Basis Reduction Algorithms. Theoretical Computer Science, 53:201–224, 1987.
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
|