Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
126 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions |
112 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Secure Hashed Diffie-Hellman over Non-DDH Groups.  |
EUROCRYPT  |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption.  |
CANS  |
2008 |
DBLP DOI BibTeX RDF |
CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems |
64 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation.  |
CRYPTO  |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
55 | Ratna Dutta, Rana Barua |
Constant Round Dynamic Group Key Agreement.  |
ISC  |
2005 |
DBLP DOI BibTeX RDF |
DDH problem, provable security, group key agreement |
44 | Allison B. Lewko, Brent Waters |
Efficient pseudorandom functions from the decisional linear assumption and weaker variants.  |
CCS  |
2009 |
DBLP DOI BibTeX RDF |
decisional linear assumption, pseudorandom functions |
44 | Adam L. Young, Moti Yung |
Relationships Between Diffie-Hellman and "Index Oracles".  |
SCN  |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log |
44 | Yevgeniy Dodis |
Efficient Construction of (Distributed) Verifiable Random Functions.  |
Public Key Cryptography  |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Kaoru Kurosawa, Ryo Nojima |
Simple Adaptive Oblivious Transfer without Random Oracle.  |
ASIACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
Adaptive OT, Fully Simulatable, DDH, Standard Model |
41 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings.  |
Public Key Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
40 | HongDa Li 0001, Bao Li 0001 |
Existence of 3-round zero-knowledge proof systems for NP.  |
Sci. China Ser. F Inf. Sci.  |
2008 |
DBLP DOI BibTeX RDF |
non-black-box simulation, DDH assumption, zero-knowledge proof, interactive proof |
40 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem.  |
ProvSec  |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
40 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.  |
CISC  |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
40 | Junghyun Nam, Seungjoo Kim, Dongho Won |
Secure Group Communications over Combined Wired and Wireless Networks.  |
TrustBus  |
2005 |
DBLP DOI BibTeX RDF |
combined wired and wireless networks, DDH assumption, mobile devices, Group key agreement |
38 | Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu 0001 |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.  |
CT-RSA  |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Alexander W. Dent, Steven D. Galbraith |
Hidden Pairings and Trapdoor DDH Groups.  |
ANTS  |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption.  |
AsiaCCS  |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
29 | Ali Bagherzandi, Stanislaw Jarecki |
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem.  |
SCN  |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Tengjiao Wang 0003, Bishan Yang, Jun Gao 0003, Dongqing Yang |
Effective Data Distribution and Reallocation Strategies for Fast Query Response in Distributed Query-Intensive Data Environments.  |
APWeb  |
2008 |
DBLP DOI BibTeX RDF |
data reallocation, query response, data distribution |
29 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague |
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.  |
FoSSaCS  |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Matthieu Gaud, Jacques Traoré |
On the Anonymity of Fair Offline E-cash Systems.  |
Financial Cryptography  |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Daniele Micciancio, Erez Petrank |
Simulatable Commitments and Efficient Concurrent Zero-Knowledge.  |
EUROCRYPT  |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Ran Canetti, Shafi Goldwasser |
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack.  |
EUROCRYPT  |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Dan Boneh |
The Decision Diffie-Hellman Problem.  |
ANTS  |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Han Jiang 0001, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang |
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption.  |
J. Ambient Intell. Humaniz. Comput.  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto |
Rate-1 Fully Local Somewhere Extractable Hashing from DDH.  |
IACR Cryptol. ePrint Arch.  |
2024 |
DBLP BibTeX RDF |
|
23 | Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto |
Rate-1 Fully Local Somewhere Extractable Hashing from DDH.  |
Public Key Cryptography (3)  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu |
Twinkle: Threshold Signatures from DDH with Full Adaptive Security.  |
EUROCRYPT (1)  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Sourav Das, Ling Ren 0001 |
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH.  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
23 | Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu |
Twinkle: Threshold Signatures from DDH with Full Adaptive Security.  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
23 | Arthur Lazzaretti, Charalampos Papamanthou |
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH.  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
23 | Théophile Brézot, Paola de Perthuis, David Pointcheval |
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE.  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
23 | Peihan Miao 0001, Sikhar Patranabis, Gaven J. Watson |
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH.  |
Public Key Cryptography (2)  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Zicheng Zhang, Yingjie Zhou, Wei Sun 0029, Wei Lu 0021, Xiongkuo Min, Yu Wang, Guangtao Zhai |
DDH-QA: A Dynamic Digital Humans Quality Assessment Database.  |
ICME  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Théophile Brézot, Paola de Perthuis, David Pointcheval |
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE.  |
ESORICS (1)  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Arthur Lazzaretti, Charalampos Papamanthou |
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH.  |
CRYPTO (2)  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang |
Correlation Intractability and SNARGs from Sub-exponential DDH.  |
CRYPTO (4)  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments based on the DDH Assumption.  |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Hui Wang 0040, Yang Jin, Hongchang Ke, Xinping Zhang |
DDH-YOLOv5: improved YOLOv5 based on Double IoU-aware Decoupled Head for object detection.  |
J. Real Time Image Process.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Zicheng Zhang, Yingjie Zhou, Wei Sun 0029, Wei Lu 0021, Xiongkuo Min, Yu Wang, Guangtao Zhai |
DDH-QA: A Dynamic Digital Humans Quality Assessment Database.  |
CoRR  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Dario Catalano, Dario Fiore 0001, Emanuele Giunta |
Adaptively Secure Single Secret Leader Election from DDH.  |
IACR Cryptol. ePrint Arch.  |
2022 |
DBLP BibTeX RDF |
|
23 | James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan |
SNARGs for P from Sub-exponential DDH and QR.  |
IACR Cryptol. ePrint Arch.  |
2022 |
DBLP BibTeX RDF |
|
23 | Peihan Miao 0001, Sikhar Patranabis, Gaven J. Watson |
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.  |
IACR Cryptol. ePrint Arch.  |
2022 |
DBLP BibTeX RDF |
|
23 | Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang |
Correlation Intractability and SNARGs from Sub-exponential DDH.  |
IACR Cryptol. ePrint Arch.  |
2022 |
DBLP BibTeX RDF |
|
23 | Takuya Tsuruta, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki |
A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud.  |
ICCE-TW  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan |
SNARGs for P from Sub-exponential DDH and QR.  |
EUROCRYPT (2)  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Dario Catalano, Dario Fiore 0001, Emanuele Giunta |
Adaptively Secure Single Secret Leader Election from DDH.  |
PODC  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Olivier Blazy, Saqib A. Kakvi |
Identity-Based Encryption in DDH Hard Groups.  |
AFRICACRYPT  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Masayuki Fukumitsu, Shingo Hasegawa |
A Tightly Secure DDH-based Multisignature with Public-Key Aggregation.  |
Int. J. Netw. Comput.  |
2021 |
DBLP BibTeX RDF |
|
23 | Abhishek Jain 0002, Zhengzhong Jin |
Non-Interactive Zero Knowledge from Sub-exponential DDH.  |
IACR Cryptol. ePrint Arch.  |
2021 |
DBLP BibTeX RDF |
|
23 | Abhishek Jain 0002, Zhengzhong Jin |
Non-interactive Zero Knowledge from Sub-exponential DDH.  |
EUROCRYPT (1)  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Fazail Amin, Arijit Mondal, Jimson Mathew |
WLAMr-DDH: Weighted Laterals With Augmentation Mask for Discriminative Deep Hashing for Face Image Retrieval.  |
IJCNN  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Saikrishna Badrinarayanan, James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee |
Reusable Two-Round MPC from DDH.  |
IACR Cryptol. ePrint Arch.  |
2020 |
DBLP BibTeX RDF |
|
23 | Péter Kutas, Christophe Petit 0001, Javier Silva 0001 |
Trapdoor DDH Groups from Pairings and Isogenies.  |
SAC  |
2020 |
DBLP DOI BibTeX RDF |
|
23 | James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee |
Reusable Two-Round MPC from DDH.  |
TCC (2)  |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Masayuki Fukumitsu, Shingo Hasegawa |
A Tightly Secure DDH-based Multisignature with Public-Key Aggregation.  |
CANDAR (Workshops)  |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Seok-min Hwang, Hee-Jun Park, Jong-Ha Lee |
A Study on a Mask R-CNN-Based Diagnostic System Measuring DDH Angles on Ultrasound Scans.  |
IHCI (2)  |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Arunkumar Kannan, Antony J. Hodgson, Kishore Mulpuri, Rafeef Garbi |
Uncertainty Estimation for Assessment of 3D US Scan Adequacy and DDH Metric Reliability.  |
UNSURE/GRAIL@MICCAI  |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Péter Kutas, Christophe Petit 0001, Javier Silva 0001 |
Trapdoor DDH groups from pairings and isogenies.  |
IACR Cryptol. ePrint Arch.  |
2019 |
DBLP BibTeX RDF |
|
23 | Duc-Phong Le, Guomin Yang, Ali A. Ghorbani 0001 |
DDH-based Multisignatures with Public Key Aggregation.  |
IACR Cryptol. ePrint Arch.  |
2019 |
DBLP BibTeX RDF |
|
23 | Shuichi Katsumata, Shota Yamada 0001 |
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR.  |
IACR Cryptol. ePrint Arch.  |
2019 |
DBLP BibTeX RDF |
|
23 | Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka |
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem.  |
IACR Cryptol. ePrint Arch.  |
2019 |
DBLP BibTeX RDF |
|
23 | Keitaro Hashimoto, Wakaha Ogata, Toi Tomita |
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption.  |
IACR Cryptol. ePrint Arch.  |
2019 |
DBLP BibTeX RDF |
|
23 | Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka |
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem.  |
ASIACRYPT (3)  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Shuichi Katsumata, Shota Yamada 0001 |
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR.  |
Public Key Cryptography (2)  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Kresimir Nenadic, Tomislav Galba, Irena Galic |
Image processing in differential digital holography (DDH).  |
Int. Arab J. Inf. Technol.  |
2018 |
DBLP BibTeX RDF |
|
23 | Tibor Jager, Rafael Kurek, Jiaxin Pan |
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
23 | Tibor Jager, Rafael Kurek, Jiaxin Pan |
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.  |
ASIACRYPT (3)  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Benoît Libert, Thomas Peters, Chen Qian 0002 |
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption.  |
ESORICS (2)  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Akshayaram Srinivasan, Chandrasekaran Pandu Rangan |
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption.  |
ACNS  |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Huijia Lin, Vinod Vaikuntanathan |
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings.  |
IACR Cryptol. ePrint Arch.  |
2016 |
DBLP BibTeX RDF |
|
23 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments based on the DDH Assumption.  |
IACR Cryptol. ePrint Arch.  |
2016 |
DBLP BibTeX RDF |
|
23 | Elette Boyle, Niv Gilboa, Yuval Ishai |
Breaking the Circuit Size Barrier for Secure Computation Under DDH.  |
IACR Cryptol. ePrint Arch.  |
2016 |
DBLP BibTeX RDF |
|
23 | Huijia Lin |
Indistinguishability Obfuscation from DDH on 5-linear Maps and Locality-5 PRGs.  |
IACR Cryptol. ePrint Arch.  |
2016 |
DBLP BibTeX RDF |
|
23 | Abhilash Rakkunedeth Hareendranathan, Myles Mabee, Kumaradevan Punithakumar, Michelle Noga, Jacob L. Jaremko |
Toward automated classification of acetabular shape in ultrasound for diagnosis of DDH: Contour alpha angle and the rounding index.  |
Comput. Methods Programs Biomed.  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Huijia Lin, Vinod Vaikuntanathan |
Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings.  |
FOCS  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Abhilash Rakkunedeth Hareendranathan, Dornoosh Zonoobi, Myles Mabee, Chad Diederichs, Kumaradevan Punithakumar, Michelle Noga, Jacob L. Jaremko |
Hip segmentation from MRI volumes in infants for DDH diagnosis and treatment planning.  |
EMBC  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Muhammad Salman, Muhammad Asif Aziz, Munam Ali Shah |
Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks.  |
ICAC  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | David Golan, Yoni Donner, Chris Mansi, Jacob L. Jaremko, Manoj Ramachandran |
Fully Automating Graf's Method for DDH Diagnosis Using Deep Convolutional Neural Networks.  |
LABELS/DLMIA@MICCAI  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments Based on the DDH Assumption.  |
SCN  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Elette Boyle, Niv Gilboa, Yuval Ishai |
Breaking the Circuit Size Barrier for Secure Computation Under DDH.  |
CRYPTO (1)  |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 0001 |
Short Accountable Ring Signatures Based on DDH.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
23 | Guilhem Castagnos, Fabien Laguillaumie |
Linearly Homomorphic Encryption from DDH.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
23 | Akshayaram Srinivasan, C. Pandu Rangan |
Efficiently Obfuscating Re-Encryption Program under DDH Assumption.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
23 | Areen K. Al-Bashir, Mohammad A. Al-Abed, Fayez M. Abu Sharkh, Mohamed N. Kordeya, Fadi M. Al-Rousan |
Algorithm for automatic angles measurement and screening for Developmental Dysplasia of the Hip (DDH).  |
EMBC  |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Guilhem Castagnos, Fabien Laguillaumie |
Linearly Homomorphic Encryption from $$\mathsf {DDH}$$.  |
CT-RSA  |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 0001 |
Short Accountable Ring Signatures Based on DDH.  |
ESORICS (1)  |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Yannick Seurin |
New Constructions and Applications of Trapdoor DDH Groups.  |
IACR Cryptol. ePrint Arch.  |
2013 |
DBLP BibTeX RDF |
|
23 | Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen |
Efficient leakage-resilient public key encryption from DDH assumption.  |
Clust. Comput.  |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Yannick Seurin |
New Constructions and Applications of Trapdoor DDH Groups.  |
Public Key Cryptography  |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Dingding Jia, Xianhui Lu, Bao Li 0001, Qixiang Mei |
RKA Secure PKE Based on the DDH and HR Assumptions.  |
ProvSec  |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis |
How powerful are the DDH hard groups?  |
Electron. Colloquium Comput. Complex.  |
2012 |
DBLP BibTeX RDF |
|
23 | Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis |
How powerful are the DDH hard groups?  |
IACR Cryptol. ePrint Arch.  |
2012 |
DBLP BibTeX RDF |
|
23 | Shengli Liu 0001, Fangguo Zhang, Kefei Chen |
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption.  |
NSS  |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Brett Hemenway, Rafail Ostrovsky |
Extended-DDH and Lossy Trapdoor Functions.  |
Public Key Cryptography  |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel |
DDH-Like Assumptions Based on Extension Rings.  |
Public Key Cryptography  |
2012 |
DBLP DOI BibTeX RDF |
|
23 | |
DDH Problem.  |
Encyclopedia of Cryptography and Security (2nd Ed.)  |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Xiaodong Lin 0001 |
A provably secure threshold signature scheme based on DDH assumption.  |
Secur. Commun. Networks  |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Yehuda Lindell |
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption.  |
IACR Cryptol. ePrint Arch.  |
2011 |
DBLP BibTeX RDF |
|