Pages that link to "Item:Q4441904"
From MaRDI portal
The following pages link to Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack (Q4441904):
Displayed 50 items.
- Wildcarded identity-based encryption (Q2429713) (← links)
- Security models and proof strategies for plaintext-aware encryption (Q2442648) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack (Q2465333) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Lower bounds for non-black-box zero knowledge (Q2490264) (← links)
- Signcryption with non-interactive non-repudiation (Q2572979) (← links)
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Non-malleability Under Selective Opening Attacks: Implication and Separation (Q2794495) (← links)
- Optimal Computational Split-state Non-malleable Codes (Q2799103) (← links)
- A New Rabin-type Trapdoor Permutation Equivalent to Factoring (Q2804935) (← links)
- Secure and Traceable Framework for Data Circulation (Q2817476) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- On the Joint Security of Encryption and Signature in EMV (Q2890000) (← links)
- Selective Opening Security from Simulatable Data Encapsulation (Q2953779) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (Q2980852) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Hybrid Signcryption (Q3000034) (← links)
- Key Establishment Using Signcryption Techniques (Q3000038) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Identification Schemes from Key Encapsulation Mechanisms (Q3011903) (← links)
- On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes (Q3073714) (← links)
- Efficient Identity-Based Signcryption in the Standard Model (Q3092353) (← links)
- Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity (Q3104697) (← links)
- CRT-Based Outsourcing Algorithms for Modular Exponentiations (Q3179478) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- Improved Identity-Based Online/Offline Encryption (Q3194595) (← links)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model (Q3195263) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Robust Encryption (Q3408211) (← links)
- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions (Q3454585) (← links)
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond (Q3457067) (← links)
- Basics of Secrecy Coding (Q3462200) (← links)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (Q3498394) (← links)
- A Brief History of Provably-Secure Public-Key Encryption (Q3506393) (← links)
- Generic Constructions of Stateful Public Key Encryption and Their Applications (Q3506403) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Efficient Certificateless KEM in the Standard Model (Q3578258) (← links)
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model (Q3593102) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Chosen Ciphertext Security with Optimal Ciphertext Overhead (Q3600385) (← links)
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption (Q3623033) (← links)
- Practical Chosen Ciphertext Secure Encryption from Factoring (Q3627442) (← links)
- A New Randomness Extraction Paradigm for Hybrid Encryption (Q3627459) (← links)
- Multi-recipient Public-Key Encryption from Simulators in Security Proofs (Q3634501) (← links)
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Q3634504) (← links)
- Anonymity from Public Key Encryption to Undeniable Signatures (Q3637142) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)