-
1
-
-
33745860457
-
DHAES: An Encryption Scheme Based on Diffie-Hellman Problem
-
M. Abdalla, M. Bellare, and P. Rogaway, "DHAES: An Encryption Scheme Based on Diffie-Hellman Problem", IEEE P1363a Submission, 1998, Available at http://grouper.ieee.org/groups/1363/addendum.html.
-
(1998)
IEEE P1363a Submission
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, "Relations Among Notions of Security for Public-Key Encryption Schemes", In Advances in Cryptology -Proceedings of Crypto'98, LNCS 1462, pp.26-45, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology -Proceedings of Crypto'98, LNCS 1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
84948986458
-
Optimal Asymmetric Encryption - How to Encrypt with RSA
-
Springer-Verlag
-
M. Bellare and P. Rogaway, "Optimal Asymmetric Encryption - How to Encrypt with RSA", In Advances in Cryptology - Proceedings of Eurocrypt'94, LNCS 950, pp.92-111, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - Proceedings of Eurocrypt'94, LNCS 950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0031619016
-
The Random Oracle Methodology, Revisited
-
ACM
-
R. Canetti, O. Goldreich, and S. Halevi, "The Random Oracle Methodology, Revisited", Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM, 1998.
-
(1998)
Proceedings of the 30Th Annual Symposium on the Theory of Computing
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
7
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Springer-Verlag
-
R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack", In Advances in Cryptology -Proceedings of Crypto'98, LNCS 1462, pp. 13-25, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology -Proceedings of Crypto'98, LNCS 1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
84874800178
-
A Public Key Cryptosystems and a Signature Schems Based on Discrete Logarithms
-
T. ElGamal, "A Public Key Cryptosystems and a Signature Schems Based on Discrete Logarithms", IEEE Transactions on Information Theory, IT-31(4), pp.469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
11
-
-
84956859011
-
How to Enhance the Security of Public-Key Encryption at Minimum Cost
-
Springer-Verlag
-
E. Fujisaki and T. Okamoto, "How to Enhance the Security of Public-Key Encryption at Minimum Cost", PKC'99, LNCS 1560, pp.53-68, Springer-Verlag, 1999.
-
(1999)
PKC'99, LNCS 1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
84957795480
-
Chosen-Ciphertext Security for any One-Way Cryptosystem
-
Springer-Verlag
-
D. Pointcheval, "Chosen-Ciphertext Security for any One-Way Cryptosystem", PKC'2000, LNCS 1751, pp.129-146, Springer-Verlag, 2000.
-
(2000)
PKC'2000, LNCS 1751
, pp. 129-146
-
-
Pointcheval, D.1
-
14
-
-
84958979582
-
On the Security of ElGamal Based Encryption
-
Springer-Verlag
-
Y. Tsiounis and M. Yung, "On the Security of ElGamal Based Encryption", PKC'98, LNCS 1431, pp.117-134, Springer-Verlag, 1998.
-
(1998)
PKC'98, LNCS 1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
15
-
-
85028933312
-
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks
-
Springer-Verlag
-
Y. Zheng and J. Seberry. "Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks", In Advances in Cryptology - Proceedings of Crypto'92, LNCS 740, pp. 292-304, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology - Proceedings of Crypto'92, LNCS 740
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
|