scientific article; zbMATH DE number 1440054
From MaRDI portal
Publication:4950040
Recommendations
- Chosen-ciphertext security without redundancy
- Chosen-Ciphertext Secure RSA-Type Cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- A practical approach to attaining chosen ciphertext security
- Chosen-ciphertext security from subset sum
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Theory of Cryptography
- Enhanced chosen-ciphertext security and applications
- Chosen ciphertext secure keyed-homomorphic public-key encryption
Cited in
(24)- scientific article; zbMATH DE number 2079933 (Why is no real title available?)
- scientific article; zbMATH DE number 1504547 (Why is no real title available?)
- A public key cryptosystem based on a subgroup membership problem
- New rank codes based encryption scheme using partial circulant matrices
- Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices
- scientific article; zbMATH DE number 4172375 (Why is no real title available?)
- Automated proofs for asymmetric encryption
- Identification schemes from key encapsulation mechanisms
- Automated proofs for asymmetric encryption
- McEliece Cryptosystem Implementation: Theory and Practice
- Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems
- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
- Chosen ciphertext secure encryption under factoring assumption revisited
- On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
- scientific article; zbMATH DE number 708812 (Why is no real title available?)
- Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
- Semantic security for the McEliece cryptosystem without random oracles
- Side Channels in the McEliece PKC
- scientific article; zbMATH DE number 176566 (Why is no real title available?)
- A public-key encryption scheme with pseudo-random ciphertexts
- Secure integration of asymmetric and symmetric encryption schemes
- CaSCaDE: (time-based) Cryptography from Space Communications DElay
- An efficient IND-CCA2 secure Paillier-based cryptosystem
- Chosen-Ciphertext Secure RSA-Type Cryptosystems
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4950040)