Pages that link to "Item:Q4441904"
From MaRDI portal
The following pages link to Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack (Q4441904):
Displayed 21 items.
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited (Q4916018) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- New Constructions and Applications of Trapdoor DDH Groups (Q4916024) (← links)
- Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices (Q4976292) (← links)
- On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki–Okamoto Transformation (Q5205006) (← links)
- On the Construction of Public Key Encryption with Sender Recovery (Q5250274) (← links)
- Adaptive Partitioning (Q5270372) (← links)
- On the Impossibility of Strong Encryption Over $\aleph_0$ (Q5323010) (← links)
- Another look at automated theorem-proving (Q5443571) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Efficient KEMs with Partial Message Recovery (Q5447520) (← links)
- On the Connection Between Signcryption and One-Pass Key Establishment (Q5448544) (← links)
- The Twin Diffie-Hellman Problem and Applications (Q5458589) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption (Q5502748) (← links)
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem (Q5505454) (← links)
- A CCA Secure Hybrid Damgård’s ElGamal Encryption (Q5505459) (← links)
- Efficient Implementation of Hybrid Encryption from Coding Theory (Q5739039) (← links)
- Efficient non-malleable commitment schemes (Q5902225) (← links)
- Scalable public-key tracing and revoking (Q5917935) (← links)
- Efficient non-malleable commitment schemes (Q5920255) (← links)