The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase IND-CCA2 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2006 (17) 2007-2012 (15) 2013-2021 (9)
Publication types (Num. hits)
article(11) inproceedings(30)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 38 occurrences of 29 keywords

Results
Found 41 publication records. Showing 41 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
182Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
161Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka Security on Hybrid Encryption with the Tag-KEM/DEM Framework. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
118Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm
118Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
118Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto A Universally Composable Secure Channel Based on the KEM-DEM Framework. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
102Phong Q. Nguyen, David Pointcheval Analysis and Improvements of NTRU Encryption Paddings. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
86Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
86Isamu Teranishi, Wakaha Ogata Relationship Between Standard Model Plaintext Awareness and Message Hiding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Standard Model, Plaintext Awareness
85Zehui Wang, Zhiguo Zhang XTR + : A Provable Security Public Key Cryptosystem. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR
84Mihir Bellare, Adriana Palacio Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
80Guilhem Castagnos Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption
75Eike Kiltz, John Malone-Lee A General Construction of IND-CCA2 Secure Public Key Encryption. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
75Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
72Haibo Tian, Xi Sun, Yumin Wang A New Public-Key Encryption Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, public-key cryptosystems, deduction
72Yitao Duan, John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung A New Randomness Extraction Paradigm for Hybrid Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction
59Duong Hieu Phan, David Pointcheval OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
59Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima IND-CCA Public Key Schemes Equivalent to Factoring n=pq. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45S. S. Aravind Vishnu, I. Praveen, M. Sethumadhavan 0001 An IND-CCA2 Secure Certificateless Hybrid Signcryption. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
45Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Search on Bibsonomy Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
45Tung Chou An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
45Tung Chou An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
45Peng Zeng 0002, Siyuan Chen, Kim-Kwang Raymond Choo An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case. Search on Bibsonomy Hum. centric Comput. Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
45Yongge Wang Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
45Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
45Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
45David Galindo A note on an IND-CCA2 secure Paillier-based cryptosystem. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
45Angsuman Das, Avishek Adhikari An efficient IND-CCA2 secure Paillier-based cryptosystem. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
45K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
45Yamin Liu, Bao Li 0001, Xianhui Lu, Yazhe Zhang PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Duong Hieu Phan, David Pointcheval On the Security Notions for Public-Key Encryption Schemes. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Mathias Herrmann, Gregor Leander A Practical Key Recovery Attack on Basic TCHo. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCHo, stream cipher, chosen ciphertext attack
29Xiaolei Dong, Zhenfu Cao, Licheng Wang New designing of cryptosystems based on quadratic fields. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quadratic field cryptography, quadratic fields, provable security, public key cryptosystem
29S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem
29ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng Constructing parallel long-message signcryption scheme from trapdoor permutation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel, signcryption, authenticated encryption, trapdoor permutations
29Satoshi Hada, Kouichi Sakurai Ciphertext-Auditable Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Isamu Teranishi, Takuro Oyama, Wakaha Ogata General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Sujing Zhou, Dongdai Lin On Anonymity of Group Signatures. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Kazukuni Kobara, Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #41 of 41 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license