Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307253
Recommendations
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
- scientific article; zbMATH DE number 1775406
- Instantiability of classical random-oracle-model encryption transforms
- The random oracle methodology, revisited.
- Secure integration of asymmetric and symmetric encryption schemes
Cited in
(32)- To label, or not to label (in generic groups)
- Random oracles and non-uniformity
- Identity-based threshold decryption on access structure
- Security of Encryption Schemes in Weakened Random Oracle Models
- Proxy Re-signature Schemes Without Random Oracles
- Theory of Cryptography
- A random oracle for all of us
- Certificateless signature scheme with security enhanced in the standard model
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- An improved efficient identity-based proxy signature in the standard model
- Completely Non-malleable Encryption Revisited
- Cryptography and algorithmic randomness
- Fully Anonymous Group Signatures Without Random Oracles
- Efficient identity-based signcryption in the standard model
- A formal security analysis of the Signal messaging protocol
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem
- Practical Threshold Signatures Without Random Oracles
- Formal Indistinguishability Extended to the Random Oracle Model
- Identity-based partially blind signature in the standard model for electronic cash
- The random oracle model: a twenty-year retrospective
- Interactive oracle proofs
- Instantiability of classical random-oracle-model encryption transforms
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- A Note on the Instantiability of the Quantum Random Oracle
- Secure identity-based signcryption in the standard model
- A unified approach to idealized model separations via indistinguishability obfuscation
- Certificateless threshold signature secure in the standard model
- How to Build a Hash Function from Any Collision-Resistant Function
- Combining Encryption and Proof of Knowledge in the Random Oracle Model
- Rate-1 incompressible encryption from standard assumptions
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Broadcast encryption based non-interactive key distribution in MANETs
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307253)