The following pages link to (Q4249317):
Displaying 50 items.
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- A semantically secure public key cryptoscheme using bit-pair shadows (Q344780) (← links)
- A public key cryptosystem based on three new provable problems (Q418738) (← links)
- Smooth projective hashing and two-message oblivious transfer (Q421036) (← links)
- Multi-verifier signatures (Q431790) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- A computational interpretation of Dolev-Yao adversaries (Q557888) (← links)
- A verifiable secret shuffle of homomorphic encryptions (Q604630) (← links)
- Provably secure server-aided verification signatures (Q636553) (← links)
- A note on a provable secure encryption scheme (Q655106) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Cryptography in the multi-string model (Q744350) (← links)
- Insight of the protection for data security under selective opening attacks (Q778391) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- A general compiler for password-authenticated group key exchange protocol (Q990138) (← links)
- Semantic security for the McEliece cryptosystem without random oracles (Q1009060) (← links)
- Efficient public key encryption with smallest ciphertext expansion from factoring (Q1009067) (← links)
- The twin Diffie-Hellman problem and applications (Q1037234) (← links)
- New approaches for deniable authentication (Q1037236) (← links)
- Small generic hardcore subsets for the discrete logarithm: short secret DL-keys. (Q1603445) (← links)
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability (Q1616185) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing (Q1679904) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Public key signatures in the multi-user setting. (Q1853080) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more (Q2055662) (← links)
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512 (Q2055690) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- On the CCA compatibility of public-key infrastructure (Q2061956) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiations (Q2062134) (← links)
- Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms (Q2068384) (← links)
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) (Q2089214) (← links)
- Chosen ciphertext security from injective trapdoor functions (Q2096512) (← links)
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory (Q2096518) (← links)
- Towards witness encryption without multilinear maps (Q2104410) (← links)
- SimS: a simplification of SiGamal (Q2118549) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)