|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 41 occurrences of 33 keywords
|
|
|
Results
Found 42 publication records. Showing 42 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
137 | Wei Li 0013, Dawu Gu |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
130 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
110 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
96 | Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek |
Hedged Public-Key Encryption: How to Protect against Bad Randomness. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
96 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
96 | Mihir Bellare, Adriana Palacio |
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
82 | Isamu Teranishi, Wakaha Ogata |
Relationship Between Standard Model Plaintext Awareness and Message Hiding. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Standard Model, Plaintext Awareness |
82 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Guilhem Castagnos |
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption |
69 | Yitao Duan, John F. Canny |
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
69 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
68 | Alexander W. Dent |
A Brief History of Security Models for Confidentiality. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
68 | Phong Q. Nguyen, David Pointcheval |
Analysis and Improvements of NTRU Encryption Paddings. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
68 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
55 | Cristian Ene, Yassine Lakhnech, Van Chan Ngo |
Formal Indistinguishability Extended to the Random Oracle Model. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
55 | Kaoru Kurosawa, Tsuyoshi Takagi |
Some RSA-Based Encryption Schemes with Tight Security Reduction. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
RSA-Paillier, Rabin-Paillier, Factoring, semantic security, tight reduction |
55 | Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi |
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm |
49 | Geoffrey Smith 0001, Rafael Alpízar |
Secure information flow with random assignment and encryption. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow |
43 | Siti Nabilah Yusof, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nur Raidah Salim, Sook-Chin Yip, Timothy Tzen Vun Yap |
An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem. |
Axioms |
2023 |
DBLP DOI BibTeX RDF |
|
43 | Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh |
Relationships Between Quantum IND-CPA Notions. |
TCC (1) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Zhen Liu, Yanbin Pan, Tianyuan Xie |
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project. |
IET Inf. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi |
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
43 | Baocang Wang, Hao Lei, Yupu Hu |
D-NTRU: More efficient and average-case IND-CPA secure NTRU variant. |
Inf. Sci. |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck |
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
43 | Zhen Liu, Yanbin Pan, Tianyuan Xie |
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project. |
CANS |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Rishab Goyal, Venkata Koppula, Brent Waters |
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
43 | Rishab Goyal, Venkata Koppula, Brent Waters |
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
43 | Antonio Marcedone, Claudio Orlandi |
Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). |
SCN |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Antonio Marcedone, Claudio Orlandi |
Obfuscation ==> (IND-CPA Security =/=> Circular Security). |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
43 | Victor K. Wei |
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
43 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar |
An IND-CPA cryptosystem from Demytko's primitive. |
ITW |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Takato Hirano, Koichiro Wada, Keisuke Tanaka |
Public-Key Cryptosystems with Primitive Power Roots of Unity. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism |
41 | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar |
A Provably Secure Elliptic Curve Scheme with Fast Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov |
Semantic security for the McEliece cryptosystem without random oracles. |
Des. Codes Cryptogr. |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 11T71 |
27 | Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai |
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption |
27 | Amitabh Saxena, Brecht Wyseur, Bart Preneel |
Towards Security Notions for White-Box Cryptography. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill |
Order-Preserving Symmetric Encryption. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Geoffrey Smith 0001 |
Adversaries and Information Leaks (Tutorial). |
TGC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sven Laur, Helger Lipmaa |
A New Protocol for Conditional Disclosure of Secrets and Its Applications. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption |
27 | Katja Schmidt-Samoa, Tsuyoshi Takagi |
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Helger Lipmaa |
An Oblivious Transfer Protocol with Log-Squared Communication. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer |
Displaying result #1 - #42 of 42 (100 per page; Change: )
|
|