The KDM-CCA Security of REACT
From MaRDI portal
Publication:5056009
Recommendations
- KDM-CCA Security from RKA Secure Authenticated Encryption
- CPA-to-CCA transformation for KDM security
- scientific article; zbMATH DE number 1497864
- KDM security in the hybrid framework
- A framework for achieving KDM-CCA secure public-key encryption
- scientific article; zbMATH DE number 2086506
- RCCA security for KEM+DEM style hybrid encryptions
- Theory of Cryptography
- scientific article; zbMATH DE number 1617925
Cites work
- scientific article; zbMATH DE number 1617925 (Why is no real title available?)
- scientific article; zbMATH DE number 1722673 (Why is no real title available?)
- scientific article; zbMATH DE number 1341866 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Black-box circular-secure encryption beyond affine functions
- Bounded key-dependent message security
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Efficient KDM-CCA secure public-key encryption for polynomial functions
- Encryption schemes secure under related-key and key-dependent message attacks
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully homomorphic encryption using ideal lattices
- KDM security for identity-based encryption: constructions and separations
- KDM security in the hybrid framework
- Key-dependent message security: generic amplification and completeness
- New definitions and separations for circular security
- OAEP Is Secure under Key-Dependent Messages
- On the (Im)Possibility of Key Dependent Encryption
- On the key dependent message security of the Fujisaki-Okamoto constructions
- Secure integration of asymmetric and symmetric encryption schemes
This page was built for publication: The KDM-CCA Security of REACT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5056009)