Pages that link to "Item:Q4441904"
From MaRDI portal
The following pages link to Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack (Q4441904):
Displayed 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- Polly cracker, revisited (Q285245) (← links)
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Possibility and impossibility results for selective decommitments (Q451116) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Insight of the protection for data security under selective opening attacks (Q778391) (← links)
- CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications (Q778412) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (Q989522) (← links)
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- The twin Diffie-Hellman problem and applications (Q1037234) (← links)
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability (Q1616185) (← links)
- Certifying trapdoor permutations, revisited (Q1629429) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Quantum lattice enumeration and tweaking discrete pruning (Q1633464) (← links)
- LWE without modular reduction and improved side-channel attacks against BLISS (Q1633471) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing (Q1679904) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- Towards practical key exchange from ordinary isogeny graphs (Q1710681) (← links)
- Robustly reusable fuzzy extractor from standard assumptions (Q1710686) (← links)
- On the impossibility of structure-preserving deterministic primitives (Q1715860) (← links)
- Efficient public key encryption with equality test in the standard model (Q1725691) (← links)
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption (Q1746967) (← links)
- All-but-many encryption (Q1747665) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- Robust encryption (Q1753165) (← links)
- DAGS: key encapsulation using dyadic GS codes (Q1755960) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Practical public key encryption with selective opening security for receivers (Q2004703) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- Delegating a product of group exponentiations with application to signature schemes (Q2025335) (← links)
- Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures (Q2040024) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- Compact designated verifier NIZKs from the CDH assumption without pairings (Q2051369) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- Analysing the HPKE standard (Q2056674) (← links)
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model (Q2061910) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) (Q2089214) (← links)
- Towards witness encryption without multilinear maps (Q2104410) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)