Security of Encryption Schemes in Weakened Random Oracle Models
From MaRDI portal
Publication:3562912
Recommendations
- Random oracle model and analysis of primitives of a cryptographic scheme
- Security of Digital Signature Schemes in Weakened Random Oracle Models
- scientific article; zbMATH DE number 2079934
- Limits of random oracles in secure computation (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- The equivalence of the random oracle model and the ideal cipher model, revisited
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- Security Analysis of Constructions Combining FIL Random Oracles
- On the bit security of the weak Diffie-Hellman problem
Cited in
(8)- On the Weak Ideal Compression Functions
- Theory of Cryptography
- Hash functions from defective ideal ciphers
- Security Analysis of Constructions Combining FIL Random Oracles
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- scientific article; zbMATH DE number 1583767 (Why is no real title available?)
- Formal Indistinguishability Extended to the Random Oracle Model
- scientific article; zbMATH DE number 1107669 (Why is no real title available?)
This page was built for publication: Security of Encryption Schemes in Weakened Random Oracle Models
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562912)