-
1
-
-
84946837370
-
Key-privacy in public-key encryption
-
Boyd, C. (ed.), Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001). doi:10.1007/3-540-45682-1_33
-
(2001)
ASIACRYPT 2001. LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
2
-
-
70549108157
-
-
Springer Science & Business Media, Heidelberg
-
Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer Science & Business Media, Heidelberg (2009)
-
(2009)
Post-Quantum Cryptography
-
-
Bernstein, D.J.1
Buchmann, J.2
Dahmen, E.3
-
3
-
-
0343337504
-
Nonmalleable cryptography
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM J. Comput. 30(2), 391–437 (2000)
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
4
-
-
84866481430
-
A CCA2 secure variant of the mceliece cryptosystem
-
Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.10
, pp. 6672-6680
-
-
Döttling, N.1
Dowsley, R.2
Muller-Quade, J.3
Nascimento, A.C.A.4
-
5
-
-
83655202691
-
A distinguisher for high rate McEliece cryptosystems
-
Faugère, J., Gauthier-Umaña, V., Otmani, A., Perret, L., Tillich, J.: A distinguisher for high rate McEliece cryptosystems. In: 2011 IEEE Information Theory Workshop, ITW 2011, Paraty, Brazil, 16–20 October 2011, pp. 282–286 (2011)
-
(2011)
2011 IEEE Information Theory Workshop
, pp. 282-286
-
-
Faugère, J.1
Gauthier-Umaña, V.2
Otmani, A.3
Perret, L.4
Tillich, J.5
-
6
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Maurer, U. (ed.), Springer, Heidelberg
-
Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245–255. Springer, Heidelberg (1996). doi:10.1007/3-540-68339-9_22
-
(1996)
EUROCRYPT 1996. LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
7
-
-
84878511341
-
More constructions of lossy and correlation-secure trapdoor functions
-
Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More constructions of lossy and correlation-secure trapdoor functions. J. Cryptol. 26(1), 39–74 (2013)
-
(2013)
J. Cryptol.
, vol.26
, Issue.1
, pp. 39-74
-
-
Freeman, D.M.1
Goldreich, O.2
Kiltz, E.3
Rosen, A.4
Segev, G.5
-
8
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC), Seattle, Washigton, USA, 14–17 May 1989, pp. 25–32 (1989)
-
(1989)
Proceedings of the 21St Annual ACM Symposium on Theory of Computing (STOC)
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
9
-
-
85021774226
-
Anonymity on public-key cryptosystems. Ph.D. thesis, Tokyo Institute of
-
Hayashi, R.: Anonymity on public-key cryptosystems. Ph.D. thesis, Tokyo Institute of Technology (2007)
-
(2007)
Technology
-
-
Hayashi, R.1
-
10
-
-
33746104831
-
Parallel and concurrent security of the HB and HB + protocols
-
Vaudenay, S. (ed.), Springer, Heidelberg
-
+ protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73–87. Springer, Heidelberg (2006). doi:10.1007/11761679_6
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
11
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC
-
Kim, K. (ed.), Springer, Heidelberg
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19–35. Springer, Heidelberg (2001). doi:10.1007/3-540-44586-2_2
-
(2001)
PKC 2001. LNCS
, vol.1992
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
12
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 4244, 114–116 (1978)
-
(1978)
DSN Prog. Rep.
, vol.4244
, pp. 114-116
-
-
McEliece, R.J.1
-
14
-
-
51349142711
-
Semantic security for the McEliece cryptosystem without random oracles
-
Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Crypt. 49(1–3), 289–305 (2008)
-
(2008)
Des. Codes Crypt.
, vol.49
, Issue.13
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
15
-
-
84884495820
-
Secure and anonymous hybrid encryption from coding theory
-
Gaborit, P. (ed.), Springer, Heidelberg
-
Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 174–187. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38616-9_12
-
(2013)
Pqcrypto 2013. LNCS
, vol.7932
, pp. 174-187
-
-
Persichetti, E.1
-
16
-
-
67650674979
-
Chosen-ciphertext security via correlated products
-
Reingold, O. (ed.), Springer, Heidelberg
-
Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 419–436. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00457-5_25
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 419-436
-
-
Rosen, A.1
Segev, G.2
-
17
-
-
38349028850
-
On the key-privacy issue of McEliece public-key encryption
-
Boztaş, S., Lu, H.-F.F. (eds.), Springer, Heidelberg
-
Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key encryption. In: Boztaş, S., Lu, H.-F.F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 168–177. Springer, Heidelberg (2007). doi:10.1007/978-3-540-77224-8_21
-
(2007)
AAECC 2007. LNCS
, vol.4851
, pp. 168-177
-
-
Yamakawa, S.1
Cui, Y.2
Kobara, K.3
Hagiwara, M.4
Imai, H.5
|