Verifiable Random Functions from Identity-Based Key Encapsulation (Englisch)
Freier Zugriff
- Neue Suche nach: Abdalla, Michel
- Neue Suche nach: Catalano, Dario
- Neue Suche nach: Fiore, Dario
- Neue Suche nach: Abdalla, Michel
- Neue Suche nach: Catalano, Dario
- Neue Suche nach: Fiore, Dario
In:
Advances in Cryptology - EUROCRYPT 2009
11
;
554-571
;
2009
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Verifiable Random Functions from Identity-Based Key Encapsulation
-
Beteiligte:
-
Erschienen in:Advances in Cryptology - EUROCRYPT 2009 , 11 ; 554-571Lecture Notes in Computer Science ; 5479, 11 ; 554-571
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningBellare, Mihir / Hofheinz, Dennis / Yilek, Scott et al. | 2009
- 36
-
Breaking RSA Generically Is Equivalent to FactoringAggarwal, Divesh / Maurer, Ueli et al. | 2009
- 54
-
Resettably Secure ComputationGoyal, Vipul / Sahai, Amit et al. | 2009
- 72
-
On the Security Loss in Cryptographic ReductionsLu, Chi-Jen et al. | 2009
- 88
-
On Randomizing Hash Functions to Strengthen the Security of Digital SignaturesGauravaram, Praveen / Knudsen, Lars R. et al. | 2009
- 106
-
Cryptanalysis of MDC-2Knudsen, Lars R. / Mendel, Florian / Rechberger, Christian / Thomsen, Søren S. et al. | 2009
- 121
-
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MACWang, Xiaoyun / Yu, Hongbo / Wang, Wei / Zhang, Haina / Zhan, Tao et al. | 2009
- 134
-
Finding Preimages in Full MD5 Faster Than Exhaustive SearchSasaki, Yu / Aoki, Kazumaro et al. | 2009
- 153
-
Asymmetric Group Key AgreementWu, Qianhong / Mu, Yi / Susilo, Willy / Qin, Bo / Domingo-Ferrer, Josep et al. | 2009
- 171
-
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Gentry, Craig / Waters, Brent et al. | 2009
- 189
-
Traitors Collaborating in Public: Pirates 2.0Billet, Olivier / Phan, Duong Hieu et al. | 2009
- 206
-
Key Agreement from Close Secrets over Unsecured ChannelsKanukurthi, Bhavana / Reyzin, Leonid et al. | 2009
- 224
-
Order-Preserving Symmetric EncryptionBoldyreva, Alexandra / Chenette, Nathan / Lee, Younho / O’Neill, Adam et al. | 2009
- 242
-
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday BarrierYasuda, Kan et al. | 2009
- 260
-
On the Security of Cryptosystems with Quadratic Decryption: The Nicest CryptanalysisCastagnos, Guilhem / Laguillaumie, Fabien et al. | 2009
- 278
-
Cube Attacks on Tweakable Black Box PolynomialsDinur, Itai / Shamir, Adi et al. | 2009
- 300
-
Smashing SQUASH-0Ouafi, Khaled / Vaudenay, Serge et al. | 2009
- 313
-
Practical Chosen Ciphertext Secure Encryption from FactoringHofheinz, Dennis / Kiltz, Eike et al. | 2009
- 333
-
Realizing Hash-and-Sign Signatures under Standard AssumptionsHohenberger, Susan / Waters, Brent et al. | 2009
- 351
-
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksCamenisch, Jan / Chandran, Nishanth / Shoup, Victor et al. | 2009
- 369
-
Cryptography without (Hardly Any) Secrets ?Goldwasser, Shafi et al. | 2009
- 371
-
Salvaging Merkle-Damgård for Practical ApplicationsDodis, Yevgeniy / Ristenpart, Thomas / Shrimpton, Thomas et al. | 2009
- 389
-
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelKiltz, Eike / Pietrzak, Krzysztof et al. | 2009
- 407
-
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeBellare, Mihir / Ristenpart, Thomas et al. | 2009
- 425
-
On the Portability of Generalized Schnorr ProofsCamenisch, Jan / Kiayias, Aggelos / Yung, Moti et al. | 2009
- 443
-
A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksStandaert, François-Xavier / Malkin, Tal G. / Yung, Moti et al. | 2009
- 462
-
A Leakage-Resilient Mode of OperationPietrzak, Krzysztof et al. | 2009
- 483
-
ECM on Graphics CardsBernstein, Daniel J. / Chen, Tien-Ren / Cheng, Chen-Mou / Lange, Tanja / Yang, Bo-Yin et al. | 2009
- 502
-
Double-Base Number System for Multi-scalar MultiplicationsDoche, Christophe / Kohel, David R. / Sica, Francesco et al. | 2009
- 518
-
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of CurvesGalbraith, Steven D. / Lin, Xibin / Scott, Michael et al. | 2009
- 536
-
Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite FieldsSatoh, Takakazu et al. | 2009
- 554
-
Verifiable Random Functions from Identity-Based Key EncapsulationAbdalla, Michel / Catalano, Dario / Fiore, Dario et al. | 2009
- 572
-
Optimal Randomness Extraction from a Diffie-Hellman ElementChevalier, Céline / Fouque, Pierre-Alain / Pointcheval, David / Zimmer, Sébastien et al. | 2009
- 590
-
A New Randomness Extraction Paradigm for Hybrid EncryptionKiltz, Eike / Pietrzak, Krzysztof / Stam, Martijn / Yung, Moti et al. | 2009
- E1
-
Erratum to: Advances in Cryptology – EUROCRYPT 2009Joux, Antoine et al. | 2009