scientific article; zbMATH DE number 1302853
From MaRDI portal
Publication:4249337
Recommendations
- Preimage selective trapdoor function: how to repair an easy problem
- Chosen ciphertext security from injective trapdoor functions
- Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems
- On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
Cited in
(14)- A black-box construction of non-malleable encryption from semantically secure encryption
- Paillier's trapdoor function hides up to O(n) bits
- Use of trapdoor structures in cryptography
- Regular lossy functions and their applications in leakage-resilient cryptography
- Efficient range-trapdoor functions and applications: rate-1 OT and more
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- CCA security and trapdoor functions via key-dependent-message security
- Magic adversaries versus individual reduction: science wins either way
- Algebraic (trapdoor) one-way functions: constructions and applications
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Chosen ciphertext security from injective trapdoor functions
- Non-malleable functions and their applications
- Preimage selective trapdoor function: how to repair an easy problem
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249337)