Beyond provable security verifiable IND-CCA security of OAEP
From MaRDI portal
Publication:3073706
Recommendations
Cites work
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1842495 (Why is no real title available?)
- A Formal Language for Cryptographic Pseudocode
- A method for obtaining digital signatures and public-key cryptosystems
- A revision of the proof of the Kepler conjecture
- Another look at automated theorem-proving
- Automated proofs for asymmetric encryption
- Formal Proof of Provable Security by Game-Playing in a Proof Assistant
- Formal certification of a compiler back-end or: programming a compiler with a proof assistant
- Formal certification of code-based cryptographic proofs
- Formal proof
- Formal proof - the four color theorem
- OAEP Is Secure under Key-Dependent Messages
- Programming language techniques for cryptographic proofs
- Proofs of randomized algorithms in Coq
- Provable security for public key schemes
- RSA-OAEP is secure under the RSA assumption
- Strengthening Security of RSA-OAEP
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
Cited in
(5)- Formal verification of Saber's public-key encryption scheme in easycrypt
- Automated proofs of block cipher modes of operation
- Machine-checked security for XMSS as in RFC 8391 and SPHINCS\textsuperscript{+}
- Verifiable security of Boneh-Franklin identity-based encryption
- Post-quantum verification of Fujisaki-Okamoto
This page was built for publication: Beyond provable security verifiable IND-CCA security of OAEP
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073706)