|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 56 occurrences of 40 keywords
|
|
|
Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
112 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
101 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
101 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
98 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
76 | Daniel Jost 0001, Christian Badertscher, Fabio Banfi |
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
74 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
71 | Geoffrey Smith 0001, Rafael Alpízar |
Secure information flow with random assignment and encryption. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow |
65 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
52 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
49 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
On the Security of Cryptosystems with All-or-Nothing Transform. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Duong Hieu Phan, David Pointcheval |
Chosen-Ciphertext Security without Redundancy. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto |
Multi-recipient Public-Key Encryption from Simulators in Security Proofs. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption |
45 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator |
45 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
38 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
38 | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov |
Semantic security for the McEliece cryptosystem without random oracles. |
Des. Codes Cryptogr. |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 11T71 |
38 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Ehsan Ebrahimi |
From Plaintext-extractability to IND-CCA Security. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
38 | Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li 0001 |
IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited. |
Inscrypt |
2022 |
DBLP DOI BibTeX RDF |
|
38 | Han Wu 0005, Guangwu Xu |
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. |
CT-RSA |
2022 |
DBLP DOI BibTeX RDF |
|
38 | Kalle Ngo, Elena Dubrova, Qian Guo 0001, Thomas Johansson 0001 |
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
38 | Kalle Ngo, Elena Dubrova, Qian Guo 0001, Thomas Johansson 0001 |
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
38 | Valentin Vasseur |
QC-MDPC codes DFR and the IND-CCA security of BIKE. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
38 | Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida |
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. |
ISPEC |
2021 |
DBLP DOI BibTeX RDF |
|
38 | Sha Ma, Qiong Huang 0001 |
A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. |
Comput. J. |
2020 |
DBLP DOI BibTeX RDF |
|
38 | Hamad Al Shehhi, Emanuele Bellini 0002, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu |
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
38 | Li-Ping Wang |
Loong: a new IND-CCA-secure code-based KEM. |
ISIT |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Jan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede |
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. |
Public Key Cryptography (2) |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Hamad Al Shehhi, Emanuele Bellini 0002, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu |
An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric. |
AFRICACRYPT |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Haodong Jiang, Zhenfeng Zhang, Long Chen 0018, Hong Wang 0027, Zhi Ma 0001 |
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited. |
CRYPTO (3) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Haodong Jiang, Zhenfeng Zhang, Long Chen 0018, Hong Wang 0027, Zhi Ma 0001 |
Post-quantum IND-CCA-secure KEM without Additional Hash. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
38 | Tapas Pandit, Sumit Kumar Pandey, Rana Barua |
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version). |
J. Internet Serv. Inf. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Ingo von Maurich, Lukas Heberle, Tim Güneysu |
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. |
PQCrypto |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Wenpan Jing, Xianhui Lu, Bao Li 0001 |
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. |
Inscrypt |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Shiwei Zhang, Yi Mu 0001, Guomin Yang |
Achieving IND-CCA Security for Functional Encryption for Inner Products. |
Inscrypt |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Mihir Bellare, Dennis Hofheinz, Eike Kiltz |
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? |
J. Cryptol. |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Murat Ak, Turgut Hanoymak, Ali Aydin Selçuk |
IND-CCA secure encryption based on a Zheng-Seberry scheme. |
J. Comput. Appl. Math. |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Sumit Kumar Pandey, Santanu Sarkar 0001, Mahabir Prasad Jhanwar |
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack. |
SPACE |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento |
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin |
Beyond Provable Security Verifiable IND-CCA Security of OAEP. |
CT-RSA |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Mihir Bellare, Dennis Hofheinz, Eike Kiltz |
Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
38 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar |
Fujisaki-Okamoto IND-CCA hybrid encryption revisited. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
38 | Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt |
On Modeling IND-CCA Security in Cryptographic Protocols. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
38 | Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima |
IND-CCA Public Key Schemes Equivalent to Factoring n=pq. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi |
Foundations of Non-malleable Hash and One-Way Functions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Generic Construction of Stateful Identity Based Encryption. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Alexandra Boldyreva |
Strengthening Security of RSA-OAEP. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Manoj Prabhakaran 0001, Mike Rosulek |
Homomorphic Encryption with CCA Security. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay |
TCHo: A Hardware-Oriented Trapdoor Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography |
25 | Shengli Liu 0001, Kefei Chen, Weidong Qiu |
Identity-Based Threshold Decryption Revisited. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Chen Yang, Furong Wang, Xinmei Wang |
Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
cryptography, public-key encryption |
25 | Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Applying Fujisaki-Okamoto to Identity-Based Encryption. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Public key encryption, Identity based, Bilinear groups |
25 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
Fujisaki-Okamoto hybrid encryption revisited. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Okamoto-Uchiyama scheme, Public-key cryptography, Random Oracle Model, Chosen-ciphertext security, Tight reduction |
25 | María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar |
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yang Cui 0001, Kazukuni Kobara, Hideki Imai |
A Generic Conversion with Optimal Redundancy. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Alexandra Boldyreva, Marc Fischlin |
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Kaoru Kurosawa, Toshihiko Matsuo |
How to Remove MAC from DHIES. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
DHIES, hybrid encryption scheme |
25 | Mihir Bellare, Alexandra Boldyreva, Adriana Palacio |
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Swee-Huay Heng, Kaoru Kurosawa |
k-Resilient Identity-Based Encryption in the Standard Model. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption |
25 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
Easy Verifiable Primitives and Practical Public Key Cryptosystems. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #64 of 64 (100 per page; Change: )
|
|