scientific article; zbMATH DE number 2009959
From MaRDI portal
Publication:4434879
zbMATH Open1037.68535MaRDI QIDQ4434879FDOQ4434879
Authors: Yehuda Lindell
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560241.htm
Title of this publication is not available (Why is that?)
Recommendations
- A simpler construction of CCA2-secure public-key encryption under general assumptions
- Cryptography and Coding
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- scientific article; zbMATH DE number 2086698
- Practical chosen ciphertext secure encryption from factoring
Cited In (21)
- Non-malleable encryption: simpler, shorter, stronger
- Another step towards realizing random oracles: non-malleable point obfuscation
- Efficient selective identity-based encryption without random oracles
- A note on the Dwork-Naor timed deniable authentication
- A generic construction of CCA-secure deterministic encryption
- Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
- Non-malleable encryption: simpler, shorter, stronger
- Tightly secure signatures and public-key encryption
- On the gold standard for security of universal steganography
- Towards a Separation of Semantic and CCA Security for Public Key Encryption
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- CCA-security from adaptive all-but-one lossy trapdoor functions
- Cryptography and Coding
- Timed encryption with application to deniable key exchange
- A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes
- A simpler construction of CCA2-secure public-key encryption under general assumptions
- Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption
- Secure integration of asymmetric and symmetric encryption schemes
- Public-key anamorphism in (CCA-secure) public-key encryption and beyond
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434879)