Sponge based CCA2 secure asymmetric encryption for arbitrary length message
From MaRDI portal
Publication:3194591
Recommendations
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- scientific article; zbMATH DE number 1842495
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- OAEP reconsidered
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1759781 (Why is no real title available?)
- APE: authenticated permutation-based encryption for lightweight cryptography
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology – CRYPTO 2004
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Chosen-ciphertext security without redundancy
- Cryptography and Coding
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Efficient KEMs with Partial Message Recovery
- How Risky Is the Random-Oracle Model?
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
- Lattice cryptography for the internet
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- OAEP reconsidered
- On the Indifferentiability of the Sponge Construction
- Reset indifferentiability and its consequences
- Salvaging indifferentiability in a multi-stage setting
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Tag-KEM/DEM: A new framework for hybrid encryption
- The exact security of digital signatures -- how to sign with RSA and Rabin
- Theory of Cryptography
- Trapdoors for lattices: simpler, tighter, faster, smaller
Cited in
(4)- Signcryption schemes with insider security in an ideal permutation model
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)
- Sufficient conditions on padding schemes of sponge construction and sponge-based authenticated-encryption scheme
This page was built for publication: Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3194591)