Pages that link to "Item:Q3562884"
From MaRDI portal
The following pages link to Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model (Q3562884):
Displayed 10 items.
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- Memory lower bounds of reductions revisited (Q1648781) (← links)
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions (Q1671634) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption (Q3092354) (← links)
- Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys (Q3457069) (← links)
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited (Q4916018) (← links)