Generalized public-key cryptography with tight security (original) (raw)

A New Security Definition for Public Key Encryption Schemes and Its Applications

Xiaotie Deng

View PDFchevron_right

Efficient Public-Key Cryptography in the Presence of Key Leakage

pok lim

2010

View PDFchevron_right

Public-key encryption in a multi-user setting: Security proofs and improvements

Alexandra Boldyreva

2000

View PDFchevron_right

On the Security Notions for Public-Key Encryption Schemes

Hieu Phan

2004

View PDFchevron_right

New security notions and relations for public-key encryption

Siamak F Shahandashti

Journal of Mathematical Cryptology, 2012

View PDFchevron_right

On Constructions and Security Notions of Public-key Cryptosystems

Angsuman Das

Book Chapter, Contemporary Topics in Mathematics and Statistics with Applications, Volume-I, Asian Books Pvt Ltd., 2012

View PDFchevron_right

Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks

Suvradip Chakraborty

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

On the security of public key cryptosystems with a double decryption mechanism

David Galindo

Information Processing Letters, 2008

View PDFchevron_right

On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes

Bruce Kapron

Public-Key Cryptography – PKC 2016, 2016

View PDFchevron_right

Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries

Vincent Rijmen

Lecture Notes in Computer Science, 1999

View PDFchevron_right

Easy Verifiable Primitives and Practical Public Key Cryptosystems

David Galindo

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries (Published in K.Y. Lam and E. Okamoto, Eds., Advances in Cryptology - ASIACRYPT '99, vol. 1716 of Lecture Notes in Computer Science, pp. 165-179, Springer-Verlag, 1999

Profesore Salem Mohamed Edrah M O H A M E D Edrah

View PDFchevron_right

New approach to practical leakage-resilient public-key cryptography

Janaka Alawatugoda

Journal of Mathematical Cryptology

View PDFchevron_right

Public-Key Cryptography Theory and Practice

jc zamora

View PDFchevron_right

A new public-key cryptosystem as secure as factoring

Tatsuaki Okamoto

Lecture Notes in Computer Science, 1998

View PDFchevron_right

Public-key encryption with non-interactive opening: New constructions and stronger definitions

Dominique Schröder

Progress in Cryptology …, 2010

View PDFchevron_right

Key-Insulated Public Key Cryptosystems

dodie dodie

2002

View PDFchevron_right

A Generic Construction for Token-Controlled Public Key Encryption

David Galindo

2006

View PDFchevron_right

New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes

Mohammad Hajiabadi

Public-Key Cryptography – PKC 2018, 2018

View PDFchevron_right

A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks

Sai Nishanth

2009

View PDFchevron_right

On multivariate signature-only public key cryptosystems

Nicolas Courtois

IACR Cryptology ePrint Archive, 2001

View PDFchevron_right

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample

Willy Susilo

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Public-Key Encryption with Random Oracles

Willy Susilo

Introduction to Security Reduction, 2018

View PDFchevron_right

A new public key encryption scheme based on two cryptographic assumptions

Bubu Bhuyan

2015

View PDFchevron_right

On the security of public key protocols

nabil benhamza

Information Theory, IEEE Transactions on, 1983

View PDFchevron_right

Contribution to Privacy-Preserving Cryptographic Techniques

Man Ho Au

View PDFchevron_right

Securing group key exchange against strong corruptions and key registration attacks

Mark Manulis

International Journal of Applied Cryptography, 2008

View PDFchevron_right

A Practical Public Key Cryptosystem from Paillier and Rabin Schemes

David Galindo

2003

View PDFchevron_right

On the security of random key pre-distribution schemes

Mahalingam Ramkumar

View PDFchevron_right

A Closer Look at PKI: Security and Efficiency

Bogdan Warinschi, Marc Fischlin

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Towards an Efficient Public Key Cryptosystem

Ehab Alnfrawy

View PDFchevron_right

A Forward-Secure Public-Key Encryption Scheme

Jonathan Katz

Journal of Cryptology, 2007

View PDFchevron_right