-
1
-
-
84964989351
-
On the impossibility of tight cryptographic reductions
-
Fischlin, M., Coron, J.-S. (eds.), pp., Springer, Heidelberg
-
Bader, C., Jager, T., Li, Y., Schäge, S.: On the impossibility of tight cryptographic reductions. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 273–304. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-510
-
(2016)
EUROCRYPT 2016. LNCS
, vol.9666
, pp. 273-304
-
-
Bader, C.1
Jager, T.2
Li, Y.3
Schäge, S.4
-
2
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.), pp., ACM Press, November
-
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.) Proceedings of CCS 1993, pp. 62–73. ACM Press, November 1993
-
(1993)
Proceedings of CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0006578697
-
Certifying permutations: Non-interactive zero-knowledge based on any trapdoor permutation
-
Bellare, M., Yung, M.: Certifying permutations: non-interactive zero-knowledge based on any trapdoor permutation. J. Cryptol. 9(1), 149–166 (1996)
-
(1996)
J. Cryptol.
, vol.9
, Issue.1
, pp. 149-166
-
-
Bellare, M.1
Yung, M.2
-
4
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
1642602228
-
-
Stern, J. (ed.) EUROCRYPT 1999, Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402–414. Springer, Heidelberg (1999). https://doi.org/10. 1007/3-540-48910-X 28
-
(1999)
Computationally Private Information Retrieval with Polylogarithmic Communication
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
6
-
-
84921068281
-
On the exact security of full domain hash
-
Bellare, M. (ed.), pp., Springer, Heidelberg
-
Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6 14
-
(2000)
CRYPTO 2000. LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
7
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Knudsen, L.R. (ed.), pp., Springer, Heidelberg
-
Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272–287. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-718
-
(2002)
EUROCRYPT 2002. LNCS
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
8
-
-
36749054167
-
Efficient signature schemes with tight reductions to the diffie-hellman problems
-
Goh, E.-J., Jarecki, S., Katz, J., Wang, N.: Efficient signature schemes with tight reductions to the diffie-hellman problems. J. Cryptol. 20(4), 493–514 (2007)
-
(2007)
J. Cryptol.
, vol.20
, Issue.4
, pp. 493-514
-
-
Goh, E.-J.1
Jarecki, S.2
Katz, J.3
Wang, N.4
-
9
-
-
85028470557
-
Optimal security reductions for unique signatures: Bypassing impossibilities with a counterexample
-
Katz, J., Shacham, H. (eds.), pp., Springer, Cham
-
Guo, F., Chen, R., Susilo, W., Lai, J., Yang, G., Mu, Y.: Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10402, pp. 517–547. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63715-018
-
(2017)
CRYPTO 2017. LNCS
, vol.10402
, pp. 517-547
-
-
Guo, F.1
Chen, R.2
Susilo, W.3
Lai, J.4
Yang, G.5
Mu, Y.6
-
10
-
-
84859959646
-
Optimal security proofs for full domain hash, revisited
-
Pointcheval, D., Johansson, T. (eds.), pp., Springer, Heidelberg
-
Kakvi, S.A., Kiltz, E.: Optimal security proofs for full domain hash, revisited. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 537–553. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-432
-
(2012)
EUROCRYPT 2012. LNCS
, vol.7237
, pp. 537-553
-
-
Kakvi, S.A.1
Kiltz, E.2
-
11
-
-
84871568449
-
Certifying RSA
-
Wang, X., Sako, K. (eds.), pp., Springer, Heidelberg
-
Kakvi, S.A., Kiltz, E., May, A.: Certifying RSA. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 404–414. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34961-425
-
(2012)
ASIACRYPT 2012. LNCS
, vol.7658
, pp. 404-414
-
-
Kakvi, S.A.1
Kiltz, E.2
May, A.3
-
12
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
Cachin, C., Camenisch, J.L. (eds.), pp., Springer, Heidelberg
-
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EURO-CRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-35
-
(2004)
EURO-CRYPT 2004. LNCS
, vol.3027
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
14
-
-
79951866706
-
Efficient sequential aggregate signed data
-
Neven, G.: Efficient sequential aggregate signed data. IEEE Trans. Inf. Theory 57(3), 1803–1815 (2011)
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.3
, pp. 1803-1815
-
-
Neven, G.1
-
15
-
-
3142543313
-
Determining strengths for public keys used for exchanging symmetric keys
-
April
-
Orman, H., Hoffman, P.: Determining strengths for public keys used for exchanging symmetric keys. RFC 3766, April 2004
-
(2004)
RFC
, vol.3766
-
-
Orman, H.1
Hoffman, P.2
-
16
-
-
85071767991
-
Making NSEC5 practical for DNSSEC. Cryptology ePrint Archive
-
Papadopoulos, D., et al.: Making NSEC5 practical for DNSSEC. Cryptology ePrint Archive, Report 2017/099 (2017). https://eprint.iacr.org/2017/099
-
(2017)
Report 2017/099
-
-
Papadopoulos, D.1
-
17
-
-
23044474013
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. J. Cryptol. 17(4), 277–296 (2004)
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.R.1
|