The following pages link to Provable Security (Q2856150):
Displaying 50 items.
- On Modeling Terrorist Frauds (Q2856151) (← links)
- Authenticated Key Exchange Protocols Based on Factoring Assumption (Q2856152) (← links)
- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round (Q2856155) (← links)
- CIL Security Proof for a Password-Based Key Exchange (Q2856156) (← links)
- Non Observability in the Random Oracle Model (Q2856158) (← links)
- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture (Q2856159) (← links)
- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges (Q2856160) (← links)
- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage (Q2856161) (← links)
- k-time Proxy Signature: Formal Definition and Efficient Construction (Q2856163) (← links)
- Anonymous Signcryption against Linear Related-Key Attacks (Q2856164) (← links)
- Improved Authenticity Bound of EAX, and Refinements (Q2856165) (← links)
- The Security of the OCB Mode of Operation without the SPRP Assumption (Q2856166) (← links)
- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes (Q2856167) (← links)
- How to Remove the Exponent GCD in HK09 (Q2856168) (← links)
- Translation-Randomizable Distributions via Random Walks (Q2856169) (← links)
- RKA Secure PKE Based on the DDH and HR Assumptions (Q2856171) (← links)
- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext (Q2856172) (← links)
- Factoring-Based Proxy Re-Encryption Schemes (Q2856174) (← links)
- Towards a Secure Certificateless Proxy Re-Encryption Scheme (Q2856175) (← links)
- Password-Based Authenticated Key Exchange: An Overview (Q2948134) (← links)
- Adaptive versus Static Security in the UC Model (Q2948135) (← links)
- Impossibility of Surjective Icart-Like Encodings (Q2948136) (← links)
- On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function (Q2948138) (← links)
- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode (Q2948139) (← links)
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function (Q2948140) (← links)
- Forward-Secure Sequential Aggregate Message Authentication Revisited (Q2948141) (← links)
- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags (Q2948142) (← links)
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency (Q2948143) (← links)
- Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures (Q2948146) (← links)
- Verifiable Computation in Multiparty Protocols with Honest Majority (Q2948147) (← links)
- Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation (Q2948148) (← links)
- Compact Public Key Encryption with Minimum Ideal Property of Hash Functions (Q2948149) (← links)
- RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security (Q2948150) (← links)
- Fine-Grained Conditional Proxy Re-Encryption and Application (Q2948152) (← links)
- Constructing Subspace Membership Encryption through Inner Product Encryption (Q2948153) (← links)
- Efficient (Anonymous) Compact HIBE from Standard Assumptions (Q2948154) (← links)
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (Q2948155) (← links)
- Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack (Q2948156) (← links)
- How to Use Pseudorandom Generators in Unconditional Security Settings (Q2948157) (← links)
- Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions (Q2948158) (← links)
- A Short Fail-Stop Signature Scheme from Factoring (Q2948159) (← links)
- Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols (Q2948160) (← links)
- Timed-Release Computational Secret Sharing Scheme and Its Applications (Q2948161) (← links)
- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage (Q2948162) (← links)
- Complete Robustness in Identity-Based Encryption (Q2948163) (← links)
- Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation (Q2953845) (← links)
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures (Q2953846) (← links)
- Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update (Q2953847) (← links)
- Universally Composable Cryptographic Role-Based Access Control (Q2953848) (← links)
- ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure (Q2953851) (← links)