scientific article; zbMATH DE number 1440054
From MaRDI portal
Publication:4950040
zbMATH Open0969.94022MaRDI QIDQ4950040FDOQ4950040
Authors: David Pointcheval
Publication date: 7 May 2000
Title of this publication is not available (Why is that?)
Recommendations
- Chosen-ciphertext security without redundancy
- Chosen-Ciphertext Secure RSA-Type Cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- A practical approach to attaining chosen ciphertext security
- Chosen-ciphertext security from subset sum
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Theory of Cryptography
- Enhanced chosen-ciphertext security and applications
- Chosen ciphertext secure keyed-homomorphic public-key encryption
random oracle modelpublic key encryptionchosen-ciphertext secure encryption schemehighly secure cryptosystempartially trapdoor one-way function
Cited In (24)
- Chosen ciphertext secure encryption under factoring assumption revisited
- McEliece Cryptosystem Implementation: Theory and Practice
- On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
- Chosen-Ciphertext Secure RSA-Type Cryptosystems
- Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
- Automated proofs for asymmetric encryption
- Automated proofs for asymmetric encryption
- New rank codes based encryption scheme using partial circulant matrices
- Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices
- Identification schemes from key encapsulation mechanisms
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- An efficient IND-CCA2 secure Paillier-based cryptosystem
- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
- Title not available (Why is that?)
- Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems
- Side Channels in the McEliece PKC
- Secure integration of asymmetric and symmetric encryption schemes
- CaSCaDE: (time-based) Cryptography from Space Communications DElay
- Title not available (Why is that?)
- Semantic security for the McEliece cryptosystem without random oracles
- A public-key encryption scheme with pseudo-random ciphertexts
- A public key cryptosystem based on a subgroup membership problem
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4950040)