Key Privacy in McEliece Public Key Cryptosystem
暂无分享,去创建一个
Qiang Wang | Quan Zhang | Chaojing Tang | Xue Qiu | Chaojing Tang | Quan Zhang | X. Qiu | Qiang Wang
[1] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[2] Kazukuni Kobara,et al. Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC , 2001, Public Key Cryptography.
[3] Ernest F. Brickell,et al. An Observation on the Security of McEliece's Public-Key Cryptosystem , 1988, EUROCRYPT.
[4] Marc Fischlin,et al. Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications , 1999, EUROCRYPT.
[5] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[6] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2000, Journal of Cryptology.
[7] Henk Meijer,et al. Security-related comments regarding McEliece's public-key cryptosystem , 1987, IEEE Trans. Inf. Theory.
[8] Thomas A. Berson,et al. Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.
[9] Anand Desai,et al. The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search , 2000, CRYPTO.
[10] Mihir Bellare,et al. Key-Privacy in Public-Key Encryption , 2001, ASIACRYPT.
[11] Valery I. Korzhik,et al. Cryptanalysis of McEliece's Public-Key Cryptosystem , 1991, EUROCRYPT.
[12] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Pierre Loidreau,et al. Strengthening McEliece Cryptosystem , 2000, ASIACRYPT.
[15] Payman Mohassel,et al. A Closer Look at Anonymity and Robustness in Encryption Schemes , 2010, ASIACRYPT.
[16] Kazukuni Kobara,et al. Semantic security for the McEliece cryptosystem without random oracles , 2008, Des. Codes Cryptogr..
[17] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[18] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[19] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.