The following pages link to (Q4263421):
Displaying 50 items.
- An efficient IND-CCA2 secure Paillier-based cryptosystem (Q456166) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- New designing of cryptosystems based on quadratic fields (Q954438) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Post-quantum key exchange for the Internet and the open quantum safe project (Q1698609) (← links)
- A public-key encryption scheme based on non-linear indeterminate equations (Q1746969) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- Chosen ciphertext security from injective trapdoor functions (Q2096512) (← links)
- A performance evaluation of pairing-based broadcast encryption systems (Q2096602) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication (Q2115719) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Online-extractability in the quantum random-oracle model (Q2170106) (← links)
- D-NTRU: more efficient and average-case IND-CPA secure NTRU variant (Q2195452) (← links)
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions (Q2205895) (← links)
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge (Q2214958) (← links)
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model (Q2282274) (← links)
- Conjugacy systems based on nonabelian factorization problems and their applications in cryptography (Q2336603) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- A note on an IND-CCA2 secure paillier-based cryptosystem (Q2445334) (← links)
- A public key cryptosystem based on a subgroup membership problem (Q2572970) (← links)
- Using low-density parity-check codes to improve the McEliece cryptosystem (Q2658068) (← links)
- On optimizing electricity markets performance (Q2679792) (← links)
- An efficient and secure navigation protocol based on vehicular cloud (Q2804891) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- An Efficient and Provably Secure Certificate-Based Encryption Scheme (Q2917417) (← links)
- Selective-Opening Security in the Presence of Randomness Failures (Q2953780) (← links)
- Verifiable Security of Boneh-Franklin Identity-Based Encryption (Q3092349) (← links)
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost (Q3092350) (← links)
- Attribute-Based Broadcast Encryption Scheme Made Efficient (Q3506391) (← links)
- Relationship between Two Approaches for Defining the Standard Model PA-ness (Q3511156) (← links)
- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications (Q3540038) (← links)
- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption (Q3540039) (← links)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (Q3600515) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)
- A more efficient accountable authority IBE scheme under the DL assumption (Q5046386) (← links)
- The KDM-CCA Security of REACT (Q5056009) (← links)
- Automated Proofs for Asymmetric Encryption (Q5187835) (← links)
- On the Impossibility of Strong Encryption Over $\aleph_0$ (Q5323010) (← links)
- Strongly Secure Certificateless Public Key Encryption Without Pairing (Q5458500) (← links)
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem (Q5505454) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)
- Generic constructions of master-key KDM secure attribute-based encryption (Q6146591) (← links)
- Lattice-based cryptography: a survey (Q6183909) (← links)
- Security with functional re-encryption from CPA (Q6582176) (← links)
- Selective opening security in the quantum random oracle model, revisited (Q6635821) (← links)
- Towards compact identity-based encryption on ideal lattices (Q6636118) (← links)
- Public-key anamorphism in (CCA-secure) public-key encryption and beyond (Q6648216) (← links)
- CaSCaDE: (time-based) Cryptography from Space Communications DElay (Q6660393) (← links)