The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase IND-CCA (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2005 (17) 2006-2009 (23) 2011-2019 (16) 2020-2022 (8)
Publication types (Num. hits)
article(19) inproceedings(45)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 56 occurrences of 40 keywords

Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
125Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
112Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
101Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
101Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
98Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
76Daniel Jost 0001, Christian Badertscher, Fabio Banfi A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
74Kaoru Kurosawa, Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF KEM, standard model, hybrid encryption
71Geoffrey Smith 0001, Rafael Alpízar Secure information flow with random assignment and encryption. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow
65Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
52David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
49Yang Lu 0001, Jiguo Li 0001, Junmo Xiao Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai On the Security of Cryptosystems with All-or-Nothing Transform. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Duong Hieu Phan, David Pointcheval Chosen-Ciphertext Security without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto Multi-recipient Public-Key Encryption from Simulators in Security Proofs. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption
45Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator
45Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
38Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
38Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov Semantic security for the McEliece cryptosystem without random oracles. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 11T71
38S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Ehsan Ebrahimi From Plaintext-extractability to IND-CCA Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
38Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li 0001 IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
38Han Wu 0005, Guangwu Xu More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
38Kalle Ngo, Elena Dubrova, Qian Guo 0001, Thomas Johansson 0001 A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
38Kalle Ngo, Elena Dubrova, Qian Guo 0001, Thomas Johansson 0001 A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
38Valentin Vasseur QC-MDPC codes DFR and the IND-CCA security of BIKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
38Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. Search on Bibsonomy ISPEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
38Sha Ma, Qiong Huang 0001 A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. Search on Bibsonomy Comput. J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
38Hamad Al Shehhi, Emanuele Bellini 0002, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
38Li-Ping Wang Loong: a new IND-CCA-secure code-based KEM. Search on Bibsonomy ISIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Jan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Hamad Al Shehhi, Emanuele Bellini 0002, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric. Search on Bibsonomy AFRICACRYPT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Haodong Jiang, Zhenfeng Zhang, Long Chen 0018, Hong Wang 0027, Zhi Ma 0001 IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited. Search on Bibsonomy CRYPTO (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Haodong Jiang, Zhenfeng Zhang, Long Chen 0018, Hong Wang 0027, Zhi Ma 0001 Post-quantum IND-CCA-secure KEM without Additional Hash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
38Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version). Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Ingo von Maurich, Lukas Heberle, Tim Güneysu IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. Search on Bibsonomy PQCrypto The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Wenpan Jing, Xianhui Lu, Bao Li 0001 Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Shiwei Zhang, Yi Mu 0001, Guomin Yang Achieving IND-CCA Security for Functional Encryption for Inner Products. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Mihir Bellare, Dennis Hofheinz, Eike Kiltz Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? Search on Bibsonomy J. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Murat Ak, Turgut Hanoymak, Ali Aydin Selçuk IND-CCA secure encryption based on a Zheng-Seberry scheme. Search on Bibsonomy J. Comput. Appl. Math. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Sumit Kumar Pandey, Santanu Sarkar 0001, Mahabir Prasad Jhanwar Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin Beyond Provable Security Verifiable IND-CCA Security of OAEP. Search on Bibsonomy CT-RSA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Mihir Bellare, Dennis Hofheinz, Eike Kiltz Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
38David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar Fujisaki-Okamoto IND-CCA hybrid encryption revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
38Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt On Modeling IND-CCA Security in Cryptographic Protocols. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
38Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima IND-CCA Public Key Schemes Equivalent to Factoring n=pq. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi Foundations of Non-malleable Hash and One-Way Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Generic Construction of Stateful Identity Based Encryption. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Alexandra Boldyreva Strengthening Security of RSA-OAEP. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Manoj Prabhakaran 0001, Mike Rosulek Homomorphic Encryption with CCA Security. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay TCHo: A Hardware-Oriented Trapdoor Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography
25Shengli Liu 0001, Kefei Chen, Weidong Qiu Identity-Based Threshold Decryption Revisited. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Chen Yang, Furong Wang, Xinmei Wang Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Tadayoshi Kohno, Victor Shoup Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, public-key encryption
25Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Applying Fujisaki-Okamoto to Identity-Based Encryption. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Jin Li 0002, Fangguo Zhang, Yanming Wang A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key encryption, Identity based, Bilinear groups
25David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar Fujisaki-Okamoto hybrid encryption revisited. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Okamoto-Uchiyama scheme, Public-key cryptography, Random Oracle Model, Chosen-ciphertext security, Tight reduction
25María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yang Cui 0001, Kazukuni Kobara, Hideki Imai A Generic Conversion with Optimal Redundancy. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Alexandra Boldyreva, Marc Fischlin Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Kaoru Kurosawa, Toshihiko Matsuo How to Remove MAC from DHIES. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, hybrid encryption scheme
25Mihir Bellare, Alexandra Boldyreva, Adriana Palacio An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Swee-Huay Heng, Kaoru Kurosawa k-Resilient Identity-Based Encryption in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption
25David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar Easy Verifiable Primitives and Practical Public Key Cryptosystems. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #64 of 64 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license