How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
From MaRDI portal
Publication:2980852
DOI10.1007/978-3-319-54705-3_10zbMath1379.94049OpenAlexW2593663696MaRDI QIDQ2980852
Shengli Liu, Shuai Han, Yu Chen, Zhuo Wei, Baodong Qin
Publication date: 5 May 2017
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_10
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- Non-Malleable Functions and Their Applications
- RKA Secure PKE Based on the DDH and HR Assumptions
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Public Key Encryption against Related Key Attacks
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Cryptography Secure against Related-Key Attacks and Tampering
- Distinguisher and Related-Key Attack on the Full AES-256
- A Unified Approach to Related-Key Attacks
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Related Key Secure PKE from Hash Proof Systems
- Tamper Detection and Continuous Non-malleable Codes
- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
- Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism
- A Related-Key Rectangle Attack on the Full KASUMI
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks