Relaxing Chosen-Ciphertext Security (English)
Free access
- New search for: Canetti, Ran
- New search for: Krawczyk, Hugo
- New search for: Nielsen, Jesper B.
- New search for: Canetti, Ran
- New search for: Krawczyk, Hugo
- New search for: Nielsen, Jesper B.
In:
Advances in Cryptology - CRYPTO 2003
14
;
565-582
;
2003
- Article/Chapter (Book) / Electronic Resource
-
Title:Relaxing Chosen-Ciphertext Security
-
Contributors:
-
Published in:Advances in Cryptology - CRYPTO 2003 , 14 ; 565-582Lecture Notes in Computer Science ; 2729, 14 ; 565-582
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2003-01-01
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Factoring Large Numbers with the TWIRL DeviceShamir, Adi / Tromer, Eran et al. | 2003
- 27
-
New Partial Key Exposure Attacks on RSABlömer, Johannes / May, Alexander et al. | 2003
- 44
-
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner BasesFaugère, Jean-Charles / Joux, Antoine et al. | 2003
- 61
-
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage ModelVadhan, Salil P. et al. | 2003
- 78
-
Unconditional Authenticity and Privacy from an Arbitrarily Weak SecretRenner, Renato / Wolf, Stefan et al. | 2003
- 96
-
On Cryptographic Assumptions and ChallengesNaor, Moni et al. | 2003
- 110
-
Scalable Protocols for Authenticated Group Key ExchangeKatz, Jonathan / Yung, Moti et al. | 2003
- 126
-
Practical Verifiable Encryption and Decryption of Discrete LogarithmsCamenisch, Jan / Shoup, Victor et al. | 2003
- 145
-
Extending Oblivious Transfers EfficientlyIshai, Yuval / Kilian, Joe / Nissim, Kobbi / Petrank, Erez et al. | 2003
- 162
-
Algebraic Attacks on Combiners with MemoryArmknecht, Frederik / Krause, Matthias et al. | 2003
- 176
-
Fast Algebraic Attacks on Stream Ciphers with Linear FeedbackCourtois, Nicolas T. et al. | 2003
- 195
-
Cryptanalysis of Safer++Biryukov, Alex / Cannière, Christophe / Dellkrantz, Gustaf et al. | 2003
- 212
-
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy ProblemCheon, Jung Hee / Jun, Byungheup et al. | 2003
- 226
-
The Impact of Decryption Failures on the Security of NTRU EncryptionHowgrave-Graham, Nick / Nguyen, Phong Q. / Pointcheval, David / Proos, John / Silverman, Joseph H. / Singer, Ari / Whyte, William et al. | 2003
- 247
-
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic EncryptionDamgård, Ivan / Nielsen, Jesper Buus et al. | 2003
- 265
-
Universal Composition with Joint StateCanetti, Ran / Rabin, Tal et al. | 2003
- 282
-
Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and MoreMicciancio, Daniele / Vadhan, Salil P. et al. | 2003
- 299
-
Derandomization in CryptographyBarak, Boaz / Ong, Shien Jin / Vadhan, Salil et al. | 2003
- 316
-
On Deniability in the Common Reference String and Random Oracle ModelPass, Rafael et al. | 2003
- 338
-
Primality Proving via One Round in ECPP and One Iteration in AKSCheng, Qi et al. | 2003
- 349
-
Torus-Based CryptographyRubin, Karl / Silverberg, Alice et al. | 2003
- 366
-
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way PermutationKomano, Yuichi / Ohta, Kazuo et al. | 2003
- 383
-
Multipurpose Identity-Based SigncryptionBoyen, Xavier et al. | 2003
- 400
-
SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE ProtocolsKrawczyk, Hugo et al. | 2003
- 426
-
On Memory-Bound Functions for Fighting SpamDwork, Cynthia / Goldberg, Andrew / Naor, Moni et al. | 2003
- 445
-
Lower and Upper Bounds on Obtaining History IndependenceBuchbinder, Niv / Petrank, Erez et al. | 2003
- 463
-
Private Circuits: Securing Hardware against Probing AttacksIshai, Yuval / Sahai, Amit / Wagner, David et al. | 2003
- 482
-
A Tweakable Enciphering ModeHalevi, Shai / Rogaway, Phillip et al. | 2003
- 500
-
A Message Authentication Code Based on Unimodular Matrix GroupsCary, Matthew / Venkatesan, Ramarathnam et al. | 2003
- 513
-
Luby-Rackoff: 7 Rounds Are Enough for 2 n(1 − ε) SecurityPatarin, Jacques et al. | 2003
- 530
-
Weak Key Authenticity and the Computational Completeness of Formal EncryptionHorvitz, Omer / Gligor, Virgil et al. | 2003
- 548
-
Plaintext Awareness via Key RegistrationHerzog, Jonathan / Liskov, Moses / Micali, Silvio et al. | 2003
- 565
-
Relaxing Chosen-Ciphertext SecurityCanetti, Ran / Krawczyk, Hugo / Nielsen, Jesper B. et al. | 2003
- 583
-
Password Interception in a SSL/TLS ChannelCanvel, Brice / Hiltgen, Alain / Vaudenay, Serge / Vuagnoux, Martin et al. | 2003
- 600
-
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted CommunicationBarkan, Elad / Biham, Eli / Keller, Nathan et al. | 2003
- 617
-
Making a Faster Cryptanalytic Time-Memory Trade-OffOechslin, Philippe et al. | 2003