The following pages link to Theory of Cryptography (Q5901770):
Displaying 16 items.
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- Revisiting (R)CCA security and replay protection (Q2061954) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption (Q2229277) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines (Q2835593) (← links)
- Augmented Learning with Errors: The Untapped Potential of the Error Term (Q2948191) (← links)
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption (Q3631375) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts (Q5738790) (← links)
- Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption (Q6067364) (← links)
- Mix-nets from re-randomizable and replayable CCA-secure public-key encryption (Q6134817) (← links)
- Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE (Q6157526) (← links)