Pages that link to "Item:Q4441904"
From MaRDI portal
The following pages link to Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack (Q4441904):
Displayed 49 items.
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited (Q4916018) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- New Constructions and Applications of Trapdoor DDH Groups (Q4916024) (← links)
- Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices (Q4976292) (← links)
- Provably secure Rabin-p cryptosystem in hybrid setting (Q4989188) (← links)
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More (Q4989921) (← links)
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms (Q5041159) (← links)
- The ECCA Security of Hybrid Encryptions (Q5056044) (← links)
- (Q5140842) (← links)
- On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki–Okamoto Transformation (Q5205006) (← links)
- On the Construction of Public Key Encryption with Sender Recovery (Q5250274) (← links)
- Adaptive Partitioning (Q5270372) (← links)
- On the Impossibility of Strong Encryption Over $\aleph_0$ (Q5323010) (← links)
- Another look at automated theorem-proving (Q5443571) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Efficient KEMs with Partial Message Recovery (Q5447520) (← links)
- On the Connection Between Signcryption and One-Pass Key Establishment (Q5448544) (← links)
- The Twin Diffie-Hellman Problem and Applications (Q5458589) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption (Q5502748) (← links)
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem (Q5505454) (← links)
- A CCA Secure Hybrid Damgård’s ElGamal Encryption (Q5505459) (← links)
- Efficient Implementation of Hybrid Encryption from Coding Theory (Q5739039) (← links)
- Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family (Q5859674) (← links)
- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts (Q5862315) (← links)
- Efficient non-malleable commitment schemes (Q5902225) (← links)
- Scalable public-key tracing and revoking (Q5917935) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)
- Efficient non-malleable commitment schemes (Q5920255) (← links)
- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs (Q6041281) (← links)
- Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption (Q6041282) (← links)
- Sender-binding key encapsulation (Q6070781) (← links)
- Let attackers program ideal models: modularity and composability for adaptive compromise (Q6085264) (← links)
- Multi-instance secure public-key encryption (Q6088987) (← links)
- Post-quantum anonymity of Kyber (Q6091126) (← links)
- QCCA-secure generic transformations in the quantum random oracle model (Q6091127) (← links)
- A more complete analysis of the signal double ratchet algorithm (Q6097271) (← links)
- A construction of encryption protocols over some semidirect products (Q6100566) (← links)
- Offline Assisted Group Key Exchange (Q6108842) (← links)
- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation (Q6108852) (← links)
- A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels (Q6113961) (← links)
- Rate-1 incompressible encryption from standard assumptions (Q6114264) (← links)
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext (Q6123051) (← links)
- Memory-tight multi-challenge security of public-key encryption (Q6135444) (← links)
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model (Q6157502) (← links)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates (Q6157511) (← links)
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness (Q6157528) (← links)
- Post-quantum anonymous one-sided authenticated key exchange without random oracles (Q6169027) (← links)
- A code-based hybrid signcryption scheme (Q6175435) (← links)