The following pages link to (Q4249316):
Displaying 43 items.
- Practical cryptanalysis of ISO 9796-2 and EMV signatures (Q315558) (← links)
- A semantically secure public key cryptoscheme using bit-pair shadows (Q344780) (← links)
- A public key cryptosystem based on three new provable problems (Q418738) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- On the CCA compatibility of public-key infrastructure (Q2061956) (← links)
- Indifferentiability for public key cryptosystems (Q2096477) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- Partition oracles from weak key forgeries (Q2149813) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes (Q2229273) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold (Q2502164) (← links)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors (Q2692341) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- On CCA-Secure Somewhat Homomorphic Encryption (Q2889863) (← links)
- On the Joint Security of Encryption and Signature in EMV (Q2890000) (← links)
- On the Security of Distributed Multiprime RSA (Q2942824) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme (Q2953874) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- Chosen ciphertext attack on ZHFE (Q3121477) (← links)
- A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security (Q3196425) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Strengthening Security of RSA-OAEP (Q3623061) (← links)
- Practical Chosen Ciphertext Secure Encryption from Factoring (Q3627442) (← links)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks (Q3627444) (← links)
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model (Q3627447) (← links)
- On Quantum Chosen-Ciphertext Attacks and Learning with Errors (Q5089145) (← links)
- Triggering parametric-down conversion-based quantum key distribution via radiation field (Q5149411) (← links)
- How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts (Q5447508) (← links)
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures (Q5447516) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Universally Composable Security Analysis of TLS (Q5505479) (← links)
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol (Q5862307) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus (Q6041667) (← links)