Identification Schemes from Key Encapsulation Mechanisms (Q3011903): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1570949899 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149676 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318711 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409116 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Twin Diffie-Hellman Problem and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Knowledge Complexity of Interactive Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3495643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724585 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950040 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3210171 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374914 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine / rank
 
Normal rank

Latest revision as of 06:28, 4 July 2024

scientific article
Language Label Description Also known as
English
Identification Schemes from Key Encapsulation Mechanisms
scientific article

    Statements

    Identification Schemes from Key Encapsulation Mechanisms (English)
    0 references
    0 references
    0 references
    29 June 2011
    0 references
    identification scheme
    0 references
    key encapsulation mechanism
    0 references
    one-way-CCA security
    0 references
    concurrent man-in-the-middle attack
    0 references
    computational Diffie-Hellman assumption
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references