(Semantic Security and Pseudo-Random Permutations)
暂无分享,去创建一个
[1] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Silvio Micali,et al. On the Cryptographic Applications of Random Functions , 1984, CRYPTO.
[4] Anand Desai,et al. Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications , 2000, ASIACRYPT.
[5] Jonathan Katz,et al. Complete characterization of security notions for probabilistic private-key encryption , 2000, STOC '00.
[6] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[7] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[8] Shai Halevi,et al. A Tweakable Enciphering Mode , 2003, CRYPTO.