Pages that link to "Item:Q3627459"
From MaRDI portal
The following pages link to A New Randomness Extraction Paradigm for Hybrid Encryption (Q3627459):
Displaying 30 items.
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability (Q1616185) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Robust encryption (Q1753165) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Tightly-secure authenticated key exchange, revisited (Q2056675) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Non-malleable encryption: simpler, shorter, stronger (Q2210445) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Efficient cryptosystems from \(2^k\)-th power residue symbols (Q2397448) (← links)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy (Q2516532) (← links)
- Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli (Q2829209) (← links)
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions (Q2958152) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (Q2980852) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model (Q3195263) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Practical Chosen Ciphertext Secure Encryption from Factoring (Q3627442) (← links)
- A New Randomness Extraction Paradigm for Hybrid Encryption (Q3627459) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model (Q5205013) (← links)
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption (Q5502748) (← links)
- A CCA Secure Hybrid Damgård’s ElGamal Encryption (Q5505459) (← links)
- A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes (Q6204542) (← links)