Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli
From MaRDI portal
Publication:2829209
Recommendations
Cites work
- scientific article; zbMATH DE number 3460351 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 2206373 (Why is no real title available?)
- A New Randomness Extraction Paradigm for Hybrid Encryption
- A Simple Unpredictable Pseudo-Random Number Generator
- A monte carlo method for factorization
- Adaptive trapdoor functions and chosen-ciphertext security
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Chosen ciphertext secure encryption under factoring assumption revisited
- Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues
- Cryptanalysis of the RSA subgroup assumption from TCC 2005
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Deterministic public-key encryption for adaptively chosen plaintext distributions
- Factoring integers with elliptic curves
- Finding a small root of a bivariate integer equation; factoring with high bits known
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- How to Remove the Exponent GCD in HK09
- Improved efficiency of chosen ciphertext secure encryption from factoring
- Instantiability of RSA-OAEP under chosen-plaintext attack
- Lossy trapdoor functions and their applications
- Monte Carlo Methods for Index Computation (mod p)
- More constructions of lossy and correlation-secure trapdoor functions
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- On lattices, learning with errors, random linear codes, and cryptography
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Practical Chosen Ciphertext Secure Encryption from Factoring
- Probability Inequalities for Sums of Bounded Random Variables
- Secure Hybrid Encryption from Weakened Key Encapsulation
- The Group of Signed Quadratic Residues and Applications
- Theory of Cryptography
This page was built for publication: Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829209)