Pages that link to "Item:Q3611780"
From MaRDI portal
The following pages link to Chosen-Ciphertext Security via Correlated Products (Q3611780):
Displaying 27 items.
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- More constructions of lossy and correlation-secure trapdoor functions (Q1946593) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN (Q1981773) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- Non-malleable functions and their applications (Q2121503) (← links)
- The magic of ELFs (Q2318089) (← links)
- On derandomizing Yao's weak-to-strong OWF construction (Q2697871) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- The Magic of ELFs (Q2835598) (← links)
- General Construction of Chameleon All-But-One Trapdoor Functions (Q3092363) (← links)
- Receiver Selective Opening Security from Indistinguishability Obfuscation (Q3179497) (← links)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model (Q3195263) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs (Q3408193) (← links)
- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions (Q3454585) (← links)
- Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More (Q3457126) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model (Q3627447) (← links)
- A public key cryptosystem and a signature scheme based on discrete logarithms (Q3689092) (← links)
- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption (Q4933224) (← links)
- Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments (Q5252662) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions (Q5919680) (← links)
- A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels (Q6113961) (← links)