Complete Robustness in Identity-Based Encryption
暂无分享,去创建一个
[1] Martijn Stam,et al. Understanding Adaptivity: Random Systems Revisited , 2012, ASIACRYPT.
[2] Lars R. Knudsen,et al. Cryptanalysis of LOKI91 , 1992, AUSCRYPT.
[3] John P. Steinberger,et al. The preimage security of double-block-length compression functions , 2011, IACR Cryptol. ePrint Arch..
[4] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.
[5] Mihir Bellare,et al. Robust Encryption , 2010, TCC.
[6] Payman Mohassel,et al. A Closer Look at Anonymity and Robustness in Encryption Schemes , 2010, ASIACRYPT.
[7] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[8] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[9] Moni Naor,et al. Non-Malleable Cryptography (Extended Abstract) , 1991, STOC 1991.
[10] Eli Biham,et al. New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract) , 1994, EUROCRYPT.
[11] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[12] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[13] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[14] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[15] Stefan Lucks. Ciphers Secure against Related-Key Attacks , 2004, FSE.
[16] Yuval Ishai,et al. Semantic Security under Related-Key Attacks and Applications , 2011, ICS.
[17] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[18] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[19] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[20] Kaoru Kurosawa,et al. Public-Key Cryptography – PKC 2013 , 2013, Lecture Notes in Computer Science.
[21] Kenneth G. Paterson,et al. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model , 2012, Public Key Cryptography.
[22] Brent Waters,et al. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption , 2006, Financial Cryptography.
[23] Kenneth G. Paterson,et al. Robust Encryption, Revisited , 2013, Public Key Cryptography.
[24] John Black,et al. Encryption-Scheme Security in the Presence of Key-Dependent Messages , 2002, Selected Areas in Cryptography.
[25] Yehuda Lindell,et al. More Efficient Constant-Round Multi-Party Computation from BMR and SHE , 2016, IACR Cryptol. ePrint Arch..
[26] Marc Fischlin,et al. Public Key Cryptography – PKC 2012 , 2012, Lecture Notes in Computer Science.
[27] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[28] Mihir Bellare,et al. Key-Privacy in Public-Key Encryption , 2001, ASIACRYPT.
[29] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[30] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[31] Kazue Sako,et al. An Auction Protocol Which Hides Bids of Losers , 2000, Public Key Cryptography.
[32] David Cash,et al. Cryptography Secure Against Related-Key Attacks and Tampering , 2011, IACR Cryptol. ePrint Arch..
[33] Kenneth G. Paterson,et al. RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures , 2012, IACR Cryptol. ePrint Arch..
[34] Hoeteck Wee. Public Key Encryption against Related Key Attacks , 2012, Public Key Cryptography.