|
|
(2 intermediate revisions by 2 users not shown) |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W3187030721 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The double ratchet: security notions, proofs, and modularization for the Signal protocol / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Post-quantum static-static key agreement using multiple protocol instances / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4341751 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4365732 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Ratcheted encryption and key exchange: the security of messaging / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Ring signatures: Stronger definitions, and constructions without random oracles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key agreement protocols and their security analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multiparty non-interactive key exchange and more from isogenies on elliptic curves / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quantum security analysis of CSIDH / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: One-round key exchange in the standard model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Post-quantum asynchronous deniable key exchange and the signal handshake / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards post-quantum security for signal's X3DH handshake / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2778861 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4409115 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bonsai trees, or how to delegate a lattice basis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: CSIDH: an efficient post-quantum commutative group action / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A formal security analysis of the Signal messaging protocol / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Stronger security and constructions of multi-designated verifier signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical isogeny-based key-exchange with optimal tightness / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generic forward-secure key agreement without signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Composability and On-Line Deniability of Authentication / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A cryptographic analysis of the TLS 1.3 handshake protocol / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Short Lattice Signatures in the Standard Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Short lattice-based one-out-of-many proofs and applications to ring signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-Interactive Key Exchange / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Security of Supersingular Isogeny Cryptosystems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Designated Verifier Proofs and Their Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An efficient authenticated key exchange from random self-reducibility on CSIDH / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: HMQV: A High-Performance Secure Diffie-Hellman Protocol / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: 2-Pass Key Exchange Protocols from CPA-Secure KEM / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security in Communication Networks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Stronger Security of Authenticated Key Exchange / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Raptor: a practical lattice-based (linkable) ring signature / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Signatures without Trapdoors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: One-Shot Verifiable Encryption from Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: He gives C-sieves on the CSIDH / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards bidirectional ratcheted key exchange / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4474199 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Information Security and Cryptology - ICISC 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the cryptographic deniability of the Signal protocol / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: DualRing: generic construction of ring signatures with efficient instantiations / rank |
| | Normal rank |
links / mardi / name | links / mardi / name |
| | |