Towards Key-Dependent Message Security in the Standard Model
From MaRDI portal
Publication:5458588
Recommendations
Cites work
- scientific article; zbMATH DE number 1722673 (Why is no real title available?)
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- Advances in Cryptology - CRYPTO 2003
- Magic functions
- On IND-CCA security modeling in cryptographic protocols
- On the security of public key protocols
- Probabilistic encryption
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Theory of Cryptography
- Theory of Cryptography
Cited in
(21)- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- On symmetric encryption and point obfuscation
- OAEP Is Secure under Key-Dependent Messages
- Universal amplification of KDM security: from 1-key circular to multi-key KDM
- Security of message authentication codes in the presence of key-dependent messages
- KDM security in the hybrid framework
- On the (Im)Possibility of Key Dependent Encryption
- Circular chosen-ciphertext security with compact ciphertexts
- Information Security and Privacy
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Randomness-dependent message security
- Secret Key and Private Key Constructions for Simple Multiterminal Source Models
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- Key-dependent message security: generic amplification and completeness
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Bounded key-dependent message security
- Security of signature schemes in the presence of key-dependent messages
- Encryption schemes secure under related-key and key-dependent message attacks
- Key-dependent message security for division function: discouraging anonymous credential sharing
- Bounded KDM security from iO and OWF
This page was built for publication: Towards Key-Dependent Message Security in the Standard Model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458588)