The following pages link to Probabilistic encryption (Q1057832):
Displayed 50 items.
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs (Q3593109) (← links)
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles (Q3600229) (← links)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption (Q3600382) (← links)
- Chosen Ciphertext Security with Optimal Ciphertext Overhead (Q3600385) (← links)
- OAEP Is Secure under Key-Dependent Messages (Q3600394) (← links)
- A Complete Public-Key Cryptosystem (Q3617413) (← links)
- Generic Case Complexity and One-Way Functions (Q3617414) (← links)
- Using Decision Problems in Public Key Cryptography (Q3617415) (← links)
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model (Q3623048) (← links)
- The Power of Anonymous Veto in Public Discussion (Q3627418) (← links)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening (Q3627426) (← links)
- Practical Chosen Ciphertext Secure Encryption from Factoring (Q3627442) (← links)
- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols (Q3631369) (← links)
- On the Theoretical Gap between Group Signatures with and without Unlinkability (Q3637138) (← links)
- A public key cryptosystem and a signature scheme based on discrete logarithms (Q3689092) (← links)
- Communication Lower Bounds via Critical Block Sensitivity (Q4554052) (← links)
- On characterizations of escrow encryption schemes (Q4571999) (← links)
- Mechanism design and communication networks (Q4586110) (← links)
- Secure and efficient off-line digital money (extended abstract) (Q4630266) (← links)
- Sliding encryption: A cryptographic tool for mobile agents (Q4639344) (← links)
- Practical Order-Revealing Encryption with Limited Leakage (Q4639494) (← links)
- An applications of signed quadratic residues in public key cryptography (Q4644792) (← links)
- Multiple ramp schemes (Q4701443) (← links)
- Functional Encryption: Origins and Recent Developments (Q4916000) (← links)
- On the Semantic Security of Functional Encryption Schemes (Q4916006) (← links)
- IMPROVEMENT OF ONE QUANTUM ENCRYPTION SCHEME (Q4917253) (← links)
- A Calculus for Game-Based Security Proofs (Q4933210) (← links)
- Encoding of Rational Numbers and Their Homomorphic Computations for FHE-Based Applications (Q4963266) (← links)
- Provably secure Rabin-p cryptosystem in hybrid setting (Q4989188) (← links)
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More (Q4989921) (← links)
- The Many Entropies in One-Way Functions (Q5021132) (← links)
- Homomorphic Encryption (Q5021133) (← links)
- How to Simulate It – A Tutorial on the Simulation Proof Technique (Q5021134) (← links)
- Weak Zero-Knowledge beyond the Black-Box Barrier (Q5026393) (← links)
- Initiator-Resilient Universally Composable Key Exchange (Q5030209) (← links)
- An information-theoretic treatment of random-self-reducibility (Q5048951) (← links)
- Probabilistic proof systems — A survey (Q5048957) (← links)
- Short Integrated PKE+PEKS in Standard Model (Q5055971) (← links)
- Group-Based Source-Destination Verifiable Encryption with Blacklist Checking (Q5056017) (← links)
- Methodology for assessing the security of cryptographic protocols (Q5089858) (← links)
- (Q5129945) (← links)
- Cryptography and cryptographic protocols (Q5138490) (← links)
- Efficient message transmission via twisted Edwards curves (Q5145769) (← links)
- ON THE CONSTRUCTION OF A SEMANTICALLY SECURE MODIFICATION OF THE MCELIECE CRYPTOSYSTEM (Q5151274) (← links)
- Cryptographic Functions from Worst-Case Complexity Assumptions (Q5188549) (← links)
- One-message statistical Zero-Knowledge Proofs and space-bounded verifier (Q5204303) (← links)
- A Note on Perfect Correctness by Derandomization (Q5267419) (← links)
- On the Impossibility of Strong Encryption Over $\aleph_0$ (Q5323010) (← links)
- A Double Perturbation Method for Reducing Dynamical Degradation of the Digital Baker Map (Q5357147) (← links)
- Homomorphic Encryptions of Sums of Groups (Q5386117) (← links)