Practical Chosen Ciphertext Secure Encryption from Factoring (English)
Free access
- New search for: Hofheinz, Dennis
- New search for: Kiltz, Eike
- New search for: Hofheinz, Dennis
- New search for: Kiltz, Eike
In:
Advances in Cryptology - EUROCRYPT 2009
6
;
313-332
;
2009
- Article/Chapter (Book) / Electronic Resource
-
Title:Practical Chosen Ciphertext Secure Encryption from Factoring
-
Contributors:Hofheinz, Dennis ( author ) / Kiltz, Eike ( author )
-
Published in:Advances in Cryptology - EUROCRYPT 2009 , 6 ; 313-332Lecture Notes in Computer Science ; 5479, 6 ; 313-332
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2009-01-01
-
Size:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningBellare, Mihir / Hofheinz, Dennis / Yilek, Scott et al. | 2009
- 36
-
Breaking RSA Generically Is Equivalent to FactoringAggarwal, Divesh / Maurer, Ueli et al. | 2009
- 54
-
Resettably Secure ComputationGoyal, Vipul / Sahai, Amit et al. | 2009
- 72
-
On the Security Loss in Cryptographic ReductionsLu, Chi-Jen et al. | 2009
- 88
-
On Randomizing Hash Functions to Strengthen the Security of Digital SignaturesGauravaram, Praveen / Knudsen, Lars R. et al. | 2009
- 106
-
Cryptanalysis of MDC-2Knudsen, Lars R. / Mendel, Florian / Rechberger, Christian / Thomsen, Søren S. et al. | 2009
- 121
-
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MACWang, Xiaoyun / Yu, Hongbo / Wang, Wei / Zhang, Haina / Zhan, Tao et al. | 2009
- 134
-
Finding Preimages in Full MD5 Faster Than Exhaustive SearchSasaki, Yu / Aoki, Kazumaro et al. | 2009
- 153
-
Asymmetric Group Key AgreementWu, Qianhong / Mu, Yi / Susilo, Willy / Qin, Bo / Domingo-Ferrer, Josep et al. | 2009
- 171
-
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Gentry, Craig / Waters, Brent et al. | 2009
- 189
-
Traitors Collaborating in Public: Pirates 2.0Billet, Olivier / Phan, Duong Hieu et al. | 2009
- 206
-
Key Agreement from Close Secrets over Unsecured ChannelsKanukurthi, Bhavana / Reyzin, Leonid et al. | 2009
- 224
-
Order-Preserving Symmetric EncryptionBoldyreva, Alexandra / Chenette, Nathan / Lee, Younho / O’Neill, Adam et al. | 2009
- 242
-
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday BarrierYasuda, Kan et al. | 2009
- 260
-
On the Security of Cryptosystems with Quadratic Decryption: The Nicest CryptanalysisCastagnos, Guilhem / Laguillaumie, Fabien et al. | 2009
- 278
-
Cube Attacks on Tweakable Black Box PolynomialsDinur, Itai / Shamir, Adi et al. | 2009
- 300
-
Smashing SQUASH-0Ouafi, Khaled / Vaudenay, Serge et al. | 2009
- 313
-
Practical Chosen Ciphertext Secure Encryption from FactoringHofheinz, Dennis / Kiltz, Eike et al. | 2009
- 333
-
Realizing Hash-and-Sign Signatures under Standard AssumptionsHohenberger, Susan / Waters, Brent et al. | 2009
- 351
-
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksCamenisch, Jan / Chandran, Nishanth / Shoup, Victor et al. | 2009
- 369
-
Cryptography without (Hardly Any) Secrets ?Goldwasser, Shafi et al. | 2009
- 371
-
Salvaging Merkle-Damgård for Practical ApplicationsDodis, Yevgeniy / Ristenpart, Thomas / Shrimpton, Thomas et al. | 2009
- 389
-
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelKiltz, Eike / Pietrzak, Krzysztof et al. | 2009
- 407
-
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeBellare, Mihir / Ristenpart, Thomas et al. | 2009
- 425
-
On the Portability of Generalized Schnorr ProofsCamenisch, Jan / Kiayias, Aggelos / Yung, Moti et al. | 2009
- 443
-
A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksStandaert, François-Xavier / Malkin, Tal G. / Yung, Moti et al. | 2009
- 462
-
A Leakage-Resilient Mode of OperationPietrzak, Krzysztof et al. | 2009
- 483
-
ECM on Graphics CardsBernstein, Daniel J. / Chen, Tien-Ren / Cheng, Chen-Mou / Lange, Tanja / Yang, Bo-Yin et al. | 2009
- 502
-
Double-Base Number System for Multi-scalar MultiplicationsDoche, Christophe / Kohel, David R. / Sica, Francesco et al. | 2009
- 518
-
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of CurvesGalbraith, Steven D. / Lin, Xibin / Scott, Michael et al. | 2009
- 536
-
Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite FieldsSatoh, Takakazu et al. | 2009
- 554
-
Verifiable Random Functions from Identity-Based Key EncapsulationAbdalla, Michel / Catalano, Dario / Fiore, Dario et al. | 2009
- 572
-
Optimal Randomness Extraction from a Diffie-Hellman ElementChevalier, Céline / Fouque, Pierre-Alain / Pointcheval, David / Zimmer, Sébastien et al. | 2009
- 590
-
A New Randomness Extraction Paradigm for Hybrid EncryptionKiltz, Eike / Pietrzak, Krzysztof / Stam, Martijn / Yung, Moti et al. | 2009
- E1
-
Erratum to: Advances in Cryptology – EUROCRYPT 2009Joux, Antoine et al. | 2009