How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (Q2980852): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_10 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2593663696 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography Secure against Related-Key Attacks and Tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: New types of cryptanalytic attacks using related keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Related-Key Rectangle Attack on the Full KASUMI / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Approach to Related-Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguisher and Related-Key Attack on the Full AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper Detection and Continuous Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related Key Secure PKE from Hash Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: RKA Secure PKE Based on the DDH and HR Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Randomness Extraction Paradigm for Hybrid Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4736430 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Encryption against Related Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 / rank
 
Normal rank

Latest revision as of 18:08, 13 July 2024

scientific article
Language Label Description Also known as
English
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
scientific article

    Statements

    How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    5 May 2017
    0 references
    related-key attacks
    0 references
    public-key encryption
    0 references
    Cramer-Shoup cryptosystem
    0 references
    0 references
    0 references
    0 references

    Identifiers