The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase IND-CPA (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2007 (18) 2008-2014 (15) 2017-2023 (9)
Publication types (Num. hits)
article(11) inproceedings(31)
Venues (Conferences, Journals, ...)
ASIACRYPT(7) IACR Cryptol. ePrint Arch.(5) ACISP(2) ISC(2) ProvSec(2) SCN(2) AAECC(1) ACNS(1) Axioms(1) CANS(1) CRYPTO(1) CT-RSA(1) Des. Codes Cryptogr.(1) ESORICS(1) EUROCRYPT(1) FMSE(1) More (+10 of total 28)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41 occurrences of 33 keywords

Results
Found 42 publication records. Showing 42 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
137Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
130Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
110Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
96Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek Hedged Public-Key Encryption: How to Protect against Bad Randomness. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
96Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
96Mihir Bellare, Adriana Palacio Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
82Isamu Teranishi, Wakaha Ogata Relationship Between Standard Model Plaintext Awareness and Message Hiding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Standard Model, Plaintext Awareness
82Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Guilhem Castagnos Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption
69Yitao Duan, John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
69David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
68Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
68Phong Q. Nguyen, David Pointcheval Analysis and Improvements of NTRU Encryption Paddings. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
68Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
55Cristian Ene, Yassine Lakhnech, Van Chan Ngo Formal Indistinguishability Extended to the Random Oracle Model. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
55Kaoru Kurosawa, Tsuyoshi Takagi Some RSA-Based Encryption Schemes with Tight Security Reduction. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA-Paillier, Rabin-Paillier, Factoring, semantic security, tight reduction
55Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm
49Geoffrey Smith 0001, Rafael Alpízar Secure information flow with random assignment and encryption. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow
43Siti Nabilah Yusof, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nur Raidah Salim, Sook-Chin Yip, Timothy Tzen Vun Yap An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem. Search on Bibsonomy Axioms The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh Relationships Between Quantum IND-CPA Notions. Search on Bibsonomy TCC (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Zhen Liu, Yanbin Pan, Tianyuan Xie Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
43Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
43Baocang Wang, Hao Lei, Yupu Hu D-NTRU: More efficient and average-case IND-CPA secure NTRU variant. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
43Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
43Zhen Liu, Yanbin Pan, Tianyuan Xie Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project. Search on Bibsonomy CANS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
43Rishab Goyal, Venkata Koppula, Brent Waters Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
43Rishab Goyal, Venkata Koppula, Brent Waters Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
43Antonio Marcedone, Claudio Orlandi Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
43Antonio Marcedone, Claudio Orlandi Obfuscation ==> (IND-CPA Security =/=> Circular Security). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
43Victor K. Wei Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
43David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar An IND-CPA cryptosystem from Demytko's primitive. Search on Bibsonomy ITW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Takato Hirano, Koichiro Wada, Keisuke Tanaka Public-Key Cryptosystems with Primitive Power Roots of Unity. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism
41David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar A Provably Secure Elliptic Curve Scheme with Fast Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov Semantic security for the McEliece cryptosystem without random oracles. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 11T71
27Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption
27Amitabh Saxena, Brecht Wyseur, Bart Preneel Towards Security Notions for White-Box Cryptography. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill Order-Preserving Symmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Geoffrey Smith 0001 Adversaries and Information Leaks (Tutorial). Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sven Laur, Helger Lipmaa A New Protocol for Conditional Disclosure of Secrets and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption
27Katja Schmidt-Samoa, Tsuyoshi Takagi Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Helger Lipmaa An Oblivious Transfer Protocol with Log-Squared Communication. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer
Displaying result #1 - #42 of 42 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license