Sponge based CCA2 secure asymmetric encryption for arbitrary length message
From MaRDI portal
Publication:3194591
DOI10.1007/978-3-319-19962-7_6zbMATH Open1358.94058OpenAlexW1134997381MaRDI QIDQ3194591FDOQ3194591
Authors: Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_6
Recommendations
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- scientific article; zbMATH DE number 1842495
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- OAEP reconsidered
Cites Work
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Title not available (Why is that?)
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Title not available (Why is that?)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Advances in Cryptology - CRYPTO 2003
- OAEP reconsidered
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Lattice Cryptography for the Internet
- Reset Indifferentiability and Its Consequences
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- Chosen-ciphertext security without redundancy
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
- Cryptography and Coding
- How Risky Is the Random-Oracle Model?
- Tag-KEM/DEM: A new framework for hybrid encryption
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
- Efficient KEMs with Partial Message Recovery
- APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
- Salvaging Indifferentiability in a Multi-stage Setting
Cited In (2)
Uses Software
This page was built for publication: Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3194591)