Pages that link to "Item:Q4441904"
From MaRDI portal
The following pages link to Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack (Q4441904):
Displayed 50 items.
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Possibility and impossibility results for selective decommitments (Q451116) (← links)
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (Q989522) (← links)
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- The twin Diffie-Hellman problem and applications (Q1037234) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (Q2269828) (← links)
- Compact proofs of retrievability (Q2392096) (← links)
- Generic constructions of identity-based and certificateless kEMs (Q2425527) (← links)
- Wildcarded identity-based encryption (Q2429713) (← links)
- Security models and proof strategies for plaintext-aware encryption (Q2442648) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack (Q2465333) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Lower bounds for non-black-box zero knowledge (Q2490264) (← links)
- Signcryption with non-interactive non-repudiation (Q2572979) (← links)
- On the Joint Security of Encryption and Signature in EMV (Q2890000) (← links)
- Hybrid Signcryption (Q3000034) (← links)
- Key Establishment Using Signcryption Techniques (Q3000038) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Identification Schemes from Key Encapsulation Mechanisms (Q3011903) (← links)
- On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes (Q3073714) (← links)
- Efficient Identity-Based Signcryption in the Standard Model (Q3092353) (← links)
- Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity (Q3104697) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Robust Encryption (Q3408211) (← links)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (Q3498394) (← links)
- A Brief History of Provably-Secure Public-Key Encryption (Q3506393) (← links)
- Generic Constructions of Stateful Public Key Encryption and Their Applications (Q3506403) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Efficient Certificateless KEM in the Standard Model (Q3578258) (← links)
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model (Q3593102) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Chosen Ciphertext Security with Optimal Ciphertext Overhead (Q3600385) (← links)
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption (Q3623033) (← links)
- Practical Chosen Ciphertext Secure Encryption from Factoring (Q3627442) (← links)
- A New Randomness Extraction Paradigm for Hybrid Encryption (Q3627459) (← links)
- Multi-recipient Public-Key Encryption from Simulators in Security Proofs (Q3634501) (← links)
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Q3634504) (← links)
- Anonymity from Public Key Encryption to Undeniable Signatures (Q3637142) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Non-Interactive Key Exchange (Q4916014) (← links)