Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization (Englisch)
Freier Zugriff
- Neue Suche nach: Bellare, Mihir
- Neue Suche nach: Sahai, Amit
- Neue Suche nach: Bellare, Mihir
- Neue Suche nach: Sahai, Amit
In:
Advances in Cryptology — CRYPTO’ 99
12
;
519-536
;
1999
-
ISSN:
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
-
Beteiligte:Bellare, Mihir ( Autor:in ) / Sahai, Amit ( Autor:in )
-
Erschienen in:Advances in Cryptology — CRYPTO’ 99 , 12 ; 519-536Lecture Notes in Computer Science ; 1666, 12 ; 519-536
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.1999
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
On the Security of RSA PaddingCoron, Jean-Sébastien / Naccache, David / Stern, Julien P. et al. | 1999
- 19
-
Cryptanalysis of the HFE Public Key Cryptosystem by RelinearizationKipnis, Aviad / Shamir, Adi et al. | 1999
- 31
-
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic ImplicationsNguyen, Phong / Stern, Jacques et al. | 1999
- 47
-
Information-Theoretic CryptographyMaurer, Ueli et al. | 1999
- 65
-
Information Theoretically Secure Communication in the Limited Storage Space ModelAumann, Yonatan / Rabin, Michael O. et al. | 1999
- 80
-
The All-or-Nothing Nature of Two-Party Secure ComputationBeimel, Amos / Malkin, Tal / Micali, Silvio et al. | 1999
- 98
-
Adaptive Security for Threshold CryptosystemsCanetti, Ran / Gennaro, Rosario / Jarecki, Stanisław / Krawczyk, Hugo / Rabin, Tal et al. | 1999
- 116
-
Two Party RSA Key GenerationGilboa, Niv et al. | 1999
- 130
-
Robust Distributed Multiplication without InteractionAbe, Masayuki et al. | 1999
- 148
-
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic VotingSchoenmakers, Berry et al. | 1999
- 165
-
Truncated Differentials and SkipjackKnudsen, Lars R. / Robshaw, M. J. B. / Wagner, David et al. | 1999
- 181
-
Fast Correlation Attacks Based on Turbo Code TechniquesJohansson, Thomas / Jönsson, Fredrik et al. | 1999
- 198
-
Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s InequalityMaitra, Subhamoy / Sarkar, Palash et al. | 1999
- 216
-
UMAC: Fast and Secure Message AuthenticationBlack, J. / Halevi, S. / Krawczyk, H. / Krovetz, T. / Rogaway, P. et al. | 1999
- 234
-
Square Hash: Fast Message Authentication via Optimized Universal Hash FunctionsEtzel, Mark / Patel, Sarvar / Ramzan, Zulfikar et al. | 1999
- 252
-
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened AssumptionsAn, Jee Hea / Bellare, Mihir et al. | 1999
- 270
-
Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday BarrierBellare, Mihir / Goldreich, Oded / Krawczyk, Hugo et al. | 1999
- 288
-
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97Nguyen, Phong et al. | 1999
- 305
-
Weakness in Quaternion SignaturesCoppersmith, Don et al. | 1999
- 315
-
Cryptanalysis of “2R” SchemesDing-Feng, Ye / Kwok-Yan, Lam / Zong-Duo, Dai et al. | 1999
- 326
-
Factoring N = p r q for Large rBoneh, Dan / Durfee, Glenn / Howgrave-Graham, Nick et al. | 1999
- 338
-
An Efficient Public Key Traitor Tracing SchemeBoneh, Dan / Franklin, Matthew et al. | 1999
- 354
-
Dynamic Traitor TracingFiat, Amos / Tassa, Tamir et al. | 1999
- 372
-
Efficient Methods for Integrating Traceability and Broadcast EncryptionGafni, Eli / Staddon, Jessica / Yin, Yiqun Lisa et al. | 1999
- 388
-
Differential Power AnalysisKocher, Paul / Jaffe, Joshua / Jun, Benjamin et al. | 1999
- 398
-
Towards Sound Approaches to Counteract Power-Analysis AttacksChari, Suresh / Jutla, Charanjit S. / Rao, Josyula R. / Rohatgi, Pankaj et al. | 1999
- 413
-
Separability and Efficiency for Generic Group Signature SchemesCamenisch, Jan / Michels, Markus / BRICS et al. | 1999
- 431
-
A Forward-Secure Digital Signature SchemeBellare, Mihir / Miner, Sara K. et al. | 1999
- 449
-
Abuse-Free Optimistic Contract SigningGaray, Juan A. / Jakobsson, Markus / MacKenzie, Philip et al. | 1999
- 467
-
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZKGoldreich, Oded / Sahai, Amit / Vadhan, Salil et al. | 1999
- 485
-
On Concurrent Zero-Knowledge with Pre-processingCrescenzo, Giovanni / Ostrovsky, Rafail et al. | 1999
- 503
-
On the Security Properties of OAEP as an All-or-Nothing TransformBoyko, Victor et al. | 1999
- 519
-
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based CharacterizationBellare, Mihir / Sahai, Amit et al. | 1999
- 537
-
Secure Integration of Asymmetric and Symmetric Encryption SchemesFujisaki, Eiichiro / Okamoto, Tatsuaki et al. | 1999
- 555
-
Auditable, Anonymous Electronic CashSander, Tomas / Ta-Shma, Amnon et al. | 1999
- 573
-
Oblivious Transfer with Adaptive QueriesNaor, Moni / Pinkas, Benny et al. | 1999
- 591
-
Compressing Cryptographic ResourcesGilboa, Niv / Ishai, Yuval et al. | 1999
- 609
-
Coding Constructions for Blacklisting Problems without Computational AssumptionsKumar, Ravi / Rajagopalan, Sridhar / Sahai, Amit et al. | 1999
- 624
-
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution SchemesPoovendran, R. / Baras, J. S. et al. | 1999