Selected Areas in Cryptography
From MaRDI portal
Publication:5491748
Recommendations
Cited in
(14)- Practical Chosen Ciphertext Secure Encryption from Factoring
- scientific article; zbMATH DE number 1440881 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Property preserving symmetric encryption revisited
- The Twin Diffie-Hellman Problem and Applications
- scientific article; zbMATH DE number 1418258 (Why is no real title available?)
- On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- The twin Diffie-Hellman problem and applications
- Simpler CCA-secure public key encryption from lossy trapdoor functions
- Practical chosen ciphertext secure encryption from factoring
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
This page was built for publication: Selected Areas in Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5491748)