-
2
-
-
84957629783
-
Plaintext Awareness, Non-Malleability, and Chosen Ciphertext Security: Implications and Separations
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway: Plaintext Awareness, Non-Malleability, and Chosen Ciphertext Security: Implications and Separations. Crypto’98, LNCS 1462, pp. 26–45, 1998.
-
(1998)
Crypto’98, LNCS 1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
84955604812
-
Algorithms for black-box fields and their application in cryptography
-
D. Boneh and R.J. Lipton: Algorithms for black-box fields and their application in cryptography. Crypto’96, LNCS 1109, pp. 283–297, 1996.
-
(1996)
Crypto’96, LNCS 1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.J.2
-
7
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
-
R. Cramer and V. Shoup: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. Crypto’98, LNCS 1462, pp. 13–25, 1998.
-
(1998)
Crypto’98, LNCS 1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
85028450627
-
Non-Malleable Cryptography
-
ACM Press
-
D. Dolev, C. Dwork and M. Naor: Non-Malleable Cryptography. STOC’91, ACM Press pp. 542–552, 1991.
-
(1991)
STOC’91
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
10
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Inform. Theory, 31, pp. 469–472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
11
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
E. Fujisaki and T. Okamoto: Secure Integration of Asymmetric and Symmetric Encryption Schemes. Crypto’99, LNCS 1666, pp. 537–554, 1999.
-
(1999)
Crypto’99, LNCS 1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
84990731886
-
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
-
A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions of Identification and Signature Problems. Proc. Crypto’86, LNCS 263, pp. 186–194, 1987.
-
(1987)
Proc. Crypto’86, LNCS 263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
0010227312
-
Complexity of a Determinate Algorithm for the Discrete Logarithm
-
V.I. Nechaev: Complexity of a Determinate Algorithm for the Discrete Logarithm. Mathematical Notes 55, pp. 165-172, 1994.
-
(1994)
Mathematical Notes
, vol.55
, pp. 165-172
-
-
Nechaev, V.I.1
-
18
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
C. Rackoff and D.R. Simon: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Crypto’91, LNCS 576, pp. 433–444, 1992.
-
(1992)
Crypto’91, LNCS 576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
19
-
-
84976779342
-
Fast probabilistic algorithms for verification of polynomial identities
-
J. Schwartz: Fast probabilistic algorithms for verification of polynomial identities. J. ACM, 27(4), pp. 701–717, 1980.
-
(1980)
J. ACM
, vol.27
, Issue.4
, pp. 701-717
-
-
Schwartz, J.1
-
20
-
-
12344258539
-
Efficient Signature Generation for Smart Cards
-
C.P. Schnorr: Efficient Signature Generation for Smart Cards. Journal of Cryptology 4 (1991), pp. 161–174.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
23
-
-
84942550160
-
Lower Bounds for Discrete Logarithms and Related Problems
-
V. Shoup: Lower Bounds for Discrete Logarithms and Related Problems. Eurocrypt’97, LNCS 1233, pp. 256-266, 1997.
-
(1997)
Eurocrypt’97, LNCS 1233
, pp. 256-266
-
-
Shoup, V.1
-
24
-
-
84948976239
-
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
-
V. Shoup: Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Eurocrypt’2000, LNCS 1807, pp. 275–288, 2000.
-
(2000)
Eurocrypt’2000, LNCS 1807
, pp. 275-288
-
-
Shoup, V.1
-
25
-
-
84888872516
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attacks
-
V. Shoup and R. Gennaro: Securing Threshold Cryptosystems against Chosen Ciphertext Attacks. Eurocrypt’98, LNCS 1404, pp. 1–16, 1998.
-
(1998)
Eurocrypt’98, LNCS 1404
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
26
-
-
84958979582
-
On the Security of ElGamal Based Encryption
-
Y. Tsiounis and M. Yung, On the Security of ElGamal Based Encryption. PKS’98, LNCS 1431, pp. 117-134, 1998.
-
(1998)
PKS’98, LNCS 1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
27
-
-
85028933312
-
Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks
-
Y. Zheng and J. Seberry, Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks. Crypto’92, LNCS 740, pp. 292-304, 1992.
-
(1992)
Crypto’92, LNCS 740
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
|