-
1
-
-
84949014932
-
DHAES: An encryption scheme based on the Diffie-Hellma problem
-
ABR98. M. Abdalla, M. Bellare, and P. Rogaway. DHAES: an encryption scheme based on the Diffie-Hellma problem. Submission, to IEEE P13631998.
-
(1998)
Submission
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Springer LNCS
-
Bon98. D. Boneh. The Decision Diffie-Hellman Problem. In Ants-III, pages 48-63, 1998. Springer LNCS 1423.
-
(1998)
Ants-Iii
, pp. 48-63
-
-
Boneh, D.1
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
CS98. R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology-Crypto ’98, pages 13-25, 1998.
-
(1998)
Advances in Cryptology-Crypto ’98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
1542593353
-
Authentication and authenticated key exchange
-
DvOW92. W. Diffie, P. van Oorschot, and M. Wiener. Authentication and authenticated key exchange. Designs, Code, and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Code, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
13
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
FO99. E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology-Crypto ’99, pages 537-554, 1999.
-
(1999)
Advances in Cryptology-Crypto ’99
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
15
-
-
84991939136
-
LFSR-based hashing and authentication
-
Kra94. H. Krawczyk. LFSR-based hashing and authentication. In Advances in Cryptology|Crypto ’94, pages 129-139, 1994.
-
(1994)
Advances in Cryptology|Crypto ’94
, pp. 129-139
-
-
Krawczyk, H.1
-
16
-
-
84955368946
-
More flexible exponentiation with precomputation
-
LL94. C. H. Lim and P. J. Lee. More flexible exponentiation with precomputation. In Advances in Cryptology-Crypto ’94, pages 95-107, 1994.
-
(1994)
Advances in Cryptology-Crypto ’94
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
18
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Mau94. U. Maurer. Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. In Advances in Cryptology-Crypto ’94, pages 271-281, 1994.
-
(1994)
Advances in Cryptology-Crypto ’94
, pp. 271-281
-
-
Maurer, U.1
-
22
-
-
84974554584
-
Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack
-
RS91. C. Rackoff and D. Simon. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology-Crypto ’91, pages 433-444, 1991.
-
(1991)
Advances in Cryptology-Crypto ’91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
24
-
-
0000164225
-
Lower bounds for discrete logarithms and related problems
-
Sho97. V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-Eurocrypt ’97, 1997.
-
(1997)
Advances in Cryptology-Eurocrypt ’97
-
-
Shoup, V.1
-
25
-
-
3042666549
-
On formal models for secure key exchange
-
April
-
Sho99. V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120, April 1999.
-
(1999)
IBM Research Report RZ
, vol.3120
-
-
Shoup, V.1
-
26
-
-
84948968075
-
A composition theorem for universal one-way hash functions
-
Sho00. V. Shoup. A composition theorem for universal one-way hash functions. In Advances in Cryptology-Eurocrypt 2000, pages 445-452, 2000.
-
(2000)
Advances in Cryptology-Eurocrypt 2000
, pp. 445-452
-
-
Shoup, V.1
-
28
-
-
0005044302
-
On the security of ElGamal based encryption
-
TY98. Y. Tsiounis and M. Yung. On the security of ElGamal based encryption. In PKC ’98, 1998.
-
(1998)
PKC ’98
-
-
Tsiounis, Y.1
Yung, M.2
-
29
-
-
85028933312
-
Practical approaches to attaining security against adaptively chosen ciphertext attacks
-
ZS92. Y. Zheng and J. Seberry. Practical approaches to attaining security against adaptively chosen ciphertext attacks. In Advances in Cryptology-Crypto ’92, pages 292-304, 1992.
-
(1992)
Advances in Cryptology-Crypto ’92
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
|