Pages that link to "Item:Q5311548"
From MaRDI portal
The following pages link to Advances in Cryptology – CRYPTO 2004 (Q5311548):
Displaying 50 items.
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- A note on a provable secure encryption scheme (Q655106) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (Q989522) (← links)
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- New approaches for deniable authentication (Q1037236) (← links)
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability (Q1616185) (← links)
- Parameter-hiding order revealing encryption (Q1633450) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs (Q1648790) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)
- An efficient post-quantum KEM from CSIDH (Q2154465) (← links)
- Non-malleable encryption: simpler, shorter, stronger (Q2210445) (← links)
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption (Q2229277) (← links)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360) (← links)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (Q2269828) (← links)
- Password-authenticated group key establishment from smooth projective hash functions (Q2299203) (← links)
- In search of mathematical primitives for deriving universal projective hash families (Q2426956) (← links)
- Security models and proof strategies for plaintext-aware encryption (Q2442648) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- A new framework for deniable secure key exchange (Q2672249) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- Unbounded HIBE with tight security (Q2692379) (← links)
- On the impossibility of purely algebraic signatures (Q2697897) (← links)
- Non-Malleable Encryption: Simpler, Shorter, Stronger (Q2796130) (← links)
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions (Q2953781) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- Identification Schemes from Key Encapsulation Mechanisms (Q3011903) (← links)
- Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity (Q3104697) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model (Q3195263) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Security Against Related Randomness Attacks via Reconstructive Extractors (Q3460096) (← links)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (Q3498394) (← links)
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks (Q3503870) (← links)
- A Brief History of Provably-Secure Public-Key Encryption (Q3506393) (← links)
- Generic Constructions of Stateful Public Key Encryption and Their Applications (Q3506403) (← links)
- Efficient Certificateless KEM in the Standard Model (Q3578258) (← links)