scientific article
From MaRDI portal
Publication:3374914
zbMath1082.94530MaRDI QIDQ3374914
Publication date: 1 March 2006
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability ⋮ Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More ⋮ A practical approach to attaining chosen ciphertext security ⋮ An efficient post-quantum KEM from CSIDH ⋮ Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model ⋮ Deniable authentication when signing keys leak ⋮ Generic constructions of identity-based and certificateless kEMs ⋮ Certificateless public key encryption: a new generic construction and two pairing-free schemes ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Security models and proof strategies for plaintext-aware encryption ⋮ A note on a provable secure encryption scheme ⋮ Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption ⋮ Identification Schemes from Key Encapsulation Mechanisms ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack ⋮ Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption ⋮ Some (in)sufficient conditions for secure hybrid encryption ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure ⋮ A New Randomness Extraction Paradigm for Hybrid Encryption ⋮ Characterizing Padding Rules of MD Hash Functions Preserving Collision Security ⋮ New Anonymity Notions for Identity-Based Encryption ⋮ Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity ⋮ New Anonymity Notions for Identity-Based Encryption ⋮ New approaches for deniable authentication ⋮ Hybrid Damgård Is CCA1-Secure under the DDH Assumption ⋮ Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) ⋮ A CCA Secure Hybrid Damgård’s ElGamal Encryption