scientific article

From MaRDI portal
Publication:3374914

zbMath1082.94530MaRDI QIDQ3374914

Victor Shoup

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilityTwo-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreA practical approach to attaining chosen ciphertext securityAn efficient post-quantum KEM from CSIDHEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelDeniable authentication when signing keys leakGeneric constructions of identity-based and certificateless kEMsCertificateless public key encryption: a new generic construction and two pairing-free schemesFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackSecurity models and proof strategies for plaintext-aware encryptionA note on a provable secure encryption schemeCramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker AssumptionIdentification Schemes from Key Encapsulation MechanismsTag-KEM/DEM: A new framework for hybrid encryptionA new and improved paradigm for hybrid encryption secure against chosen-ciphertext attackToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionSome (in)sufficient conditions for secure hybrid encryptionEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureA New Randomness Extraction Paradigm for Hybrid EncryptionCharacterizing Padding Rules of MD Hash Functions Preserving Collision SecurityNew Anonymity Notions for Identity-Based EncryptionConstructing Secure Hybrid Encryption from Key Encapsulation Mechanism with AuthenticityNew Anonymity Notions for Identity-Based EncryptionNew approaches for deniable authenticationHybrid Damgård Is CCA1-Secure under the DDH AssumptionSome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)A CCA Secure Hybrid Damgård’s ElGamal Encryption