Security of Encryption Schemes in Weakened Random Oracle Models
From MaRDI portal
Publication:3562912
DOI10.1007/978-3-642-13013-7_24zbMATH Open1281.94034OpenAlexW1503564746MaRDI QIDQ3562912FDOQ3562912
Authors: Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_24
Recommendations
- Random oracle model and analysis of primitives of a cryptographic scheme
- Security of Digital Signature Schemes in Weakened Random Oracle Models
- scientific article; zbMATH DE number 2079934
- Limits of random oracles in secure computation (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- The equivalence of the random oracle model and the ideal cipher model, revisited
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- Security Analysis of Constructions Combining FIL Random Oracles
- On the bit security of the weak Diffie-Hellman problem
Cited In (8)
- On the Weak Ideal Compression Functions
- Theory of Cryptography
- Hash functions from defective ideal ciphers
- Security Analysis of Constructions Combining FIL Random Oracles
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- Title not available (Why is that?)
- Formal Indistinguishability Extended to the Random Oracle Model
- Title not available (Why is that?)
This page was built for publication: Security of Encryption Schemes in Weakened Random Oracle Models
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562912)