The following pages link to (Q4365732):
Displaying 50 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Secret sets and applications (Q293178) (← links)
- Practical cryptanalysis of ISO 9796-2 and EMV signatures (Q315558) (← links)
- Bug attacks (Q321310) (← links)
- Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\) (Q429602) (← links)
- Possibility and impossibility results for selective decommitments (Q451116) (← links)
- Two extensions of the ring signature scheme of Rivest-Shamir-Taumann (Q454971) (← links)
- Cryptographic transformations of non-Shannon sources of information (Q466350) (← links)
- Automated proofs for asymmetric encryption (Q540682) (← links)
- Trusted computing with addition machines. I (Q681716) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Providing data confidentiality against malicious hosts in shared data spaces (Q967526) (← links)
- Semantic security for the McEliece cryptosystem without random oracles (Q1009060) (← links)
- Efficient public key encryption with smallest ciphertext expansion from factoring (Q1009067) (← links)
- Upgrading to functional encryption (Q1629441) (← links)
- Random oracles and non-uniformity (Q1648794) (← links)
- The wonderful world of global random oracles (Q1648798) (← links)
- Secret, verifiable auctions from elections (Q1749541) (← links)
- RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems (Q1938506) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices (Q2009415) (← links)
- Everybody's a target: scalability in public-key encryption (Q2055664) (← links)
- Classical vs quantum random oracles (Q2056754) (← links)
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2061966) (← links)
- Publicly verifiable zero knowledge from (collapsing) blockchains (Q2061968) (← links)
- SimS: a simplification of SiGamal (Q2118549) (← links)
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model (Q2119006) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- CryptHOL: game-based proofs in higher-order logic (Q2175214) (← links)
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption (Q2229277) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Signcryption from randomness recoverable public key encryption (Q2269814) (← links)
- New rank codes based encryption scheme using partial circulant matrices (Q2334447) (← links)
- IND-CCA secure encryption based on a Zheng-Seberry scheme (Q2349630) (← links)
- Threshold cryptography based on Asmuth-Bloom secret sharing (Q2384533) (← links)
- Instantiability of RSA-OAEP under chosen-plaintext attack (Q2408591) (← links)
- Security models and proof strategies for plaintext-aware encryption (Q2442648) (← links)
- Second order collision for the 42-step reduced DHA-256 hash function (Q2445246) (← links)
- Some observations on the theory of cryptographic hash functions (Q2491271) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Constructing parallel long-message signcryption scheme from trapdoor permutation (Q2644418) (← links)
- Post-quantum verification of Fujisaki-Okamoto (Q2692346) (← links)
- On CCA-Secure Somewhat Homomorphic Encryption (Q2889863) (← links)
- On the Security of Distributed Multiprime RSA (Q2942824) (← links)