The following pages link to Robust Encryption (Q3408211):
Displayed 30 items.
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Robust encryption (Q1753165) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Multi-designated receiver signed public key encryption (Q2170065) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Robust digital signature revisited (Q2205942) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- Anonymous protocols: notions and equivalence (Q2345446) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- The Simplest Protocol for Oblivious Transfer (Q2946440) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- Short Integrated PKE+PEKS in Standard Model (Q5055971) (← links)
- Group-Based Source-Destination Verifiable Encryption with Blacklist Checking (Q5056017) (← links)
- Generic constructions of integrated PKE and PEKS (Q5963369) (← links)
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks (Q6057196) (← links)
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more (Q6083136) (← links)
- Post-quantum anonymity of Kyber (Q6091126) (← links)
- On committing authenticated-encryption (Q6109438) (← links)
- IND-CCA security of Kyber in the quantum random oracle model, revisited (Q6134014) (← links)
- Anonymous authenticated communication (Q6134823) (← links)
- Multi-client functional encryption with fine-grained access control (Q6135394) (← links)
- Authenticated encryption with key identification (Q6135432) (← links)
- Anonymous public key encryption under corruptions (Q6135442) (← links)
- Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 (Q6151601) (← links)
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (Q6163653) (← links)