The following pages link to (Q4737235):
Displayed 50 items.
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Smooth projective hashing and two-message oblivious transfer (Q421036) (← links)
- Lossy trapdoor functions from homomorphic reproducible encryption (Q456129) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Efficient one-sided adaptively secure computation (Q514477) (← links)
- A note on a provable secure encryption scheme (Q655106) (← links)
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited (Q747509) (← links)
- Spreading alerts quietly and the subgroup escape problem (Q901371) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- On the security of public key cryptosystems with a double decryption mechanism (Q975470) (← links)
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (Q989522) (← links)
- Efficient public key encryption with smallest ciphertext expansion from factoring (Q1009067) (← links)
- New approaches for deniable authentication (Q1037236) (← links)
- Two-round adaptively secure multiparty computation from standard assumptions (Q1629408) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries (Q1631357) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing (Q1679904) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Hardness of \(k\)-LWE and applications in traitor tracing (Q1688407) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979) (← links)
- More constructions of lossy and correlation-secure trapdoor functions (Q1946593) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- A generic construction of CCA-secure deterministic encryption (Q2011031) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security (Q2290636) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Password-authenticated group key establishment from smooth projective hash functions (Q2299203) (← links)
- Public key encryption with equality test via hash proof system (Q2330090) (← links)
- Structure-preserving public-key encryption with leakage-resilient CCA security (Q2330095) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Private set intersection: new generic constructions and feasibility results (Q2408281) (← links)