The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ciphertext with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1985 (19) 1986-1990 (20) 1991-1994 (18) 1995-1997 (15) 1998-1999 (33) 2000 (22) 2001 (40) 2002 (48) 2003 (58) 2004 (55) 2005 (81) 2006 (91) 2007 (81) 2008 (89) 2009 (99) 2010 (41) 2011 (30) 2012 (57) 2013 (53) 2014 (47) 2015 (60) 2016 (51) 2017 (68) 2018 (75) 2019 (61) 2020 (71) 2021 (65) 2022 (91) 2023 (51) 2024 (21)
Publication types (Num. hits)
article(618) data(1) incollection(10) inproceedings(981) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 778 occurrences of 324 keywords

Results
Found 1611 publication records. Showing 1611 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
75Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption
75Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bilinear pairing, chosen-ciphertext security, Proxy re-encryption
75Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
74Haifeng Qian, Yuan Zhou 0008, Zhibin Li 0005, Zecheng Wang, Bing Zhang 0008 Efficient public key encryption with smallest ciphertext expansion from factoring. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
72Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
66Ran Canetti, Susan Hohenberger Chosen-ciphertext secure proxy re-encryption. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, obfuscation, chosen-ciphertext security, re-encryption
66Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF PKCS, RSA, SSL, chosen ciphertext attack
66Satoshi Hada, Kouichi Sakurai Ciphertext-Auditable Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
60Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
58Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai Conditional proxy re-encryption secure against chosen-ciphertext attack. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security
58Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
58Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption
58Tatsuyuki Matsushita, Hideki Imai Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hierarchical key assignment, black-box tracing, reduced ciphertext size
58Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
58James Manger A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF PKCS, RSA, chosen ciphertext attack, OAEP
57Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing Provably secure and efficient bounded ciphertext policy attribute based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute based encryption
57Ling Cheung, Calvin C. Newport Provably secure ciphertext policy ABE. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute-based encryption
57Jens Groth Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Kaoru Kurosawa Multi-recipient Public-Key Encryption with Shortened Ciphertext. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
52Nuttapong Attrapadung, Hideki Imai Conjunctive Broadcast and Attribute-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy
52Chik How Tan, Xun Yi, Chee Kheong Siew A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers
51Marc Joye, Jean-Jacques Quisquater, Moti Yung On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
51A. K. Leung, Stafford E. Tavares Sequence Complexity as a Test for Cryptographic Systems. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
49Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conditional proxy re-encryption, random oracle, chosen-ciphertext security
49Xavier Boyen, Qixiang Mei, Brent Waters Direct chosen ciphertext security from identity-based techniques. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity-based encryption, chosen ciphertext security
49Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee Ciphertext Comparison, a New Solution to the Millionaire Problem. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ciphertext comparison, the millionaire problem, efficiency
49Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption
49Anne Canteaut, Eric Filiol Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ciphertext only reconstruction, Boolean function, stream cipher, correlation, linear feedback shift register
49Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
49Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
49Vipul Goyal, Abhishek Jain 0002, Omkant Pandey, Amit Sahai Bounded Ciphertext Policy Attribute Based Encryption. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Anand Desai New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
49Chae Hoon Lim, Pil Joong Lee Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
43Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, Bilinear Maps, Chosen Ciphertext Security
43Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
43Vincenzo Iovino, Giuseppe Persiano Hidden-Vector Encryption with Groups of Prime Order. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Weidong Shi, Hsien-Hsin S. Lee Accelerating memory decryption and authentication with frequent value prediction. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message authentication, value prediction, secure processors
41Dennis Hofheinz, Eike Kiltz Practical Chosen Ciphertext Secure Encryption from Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF factoring, public-key encryption, chosen-ciphertext security
41Benoît Chevallier-Mames, Marc Joye Chosen-Ciphertext Secure RSA-Type Cryptosystems. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security
41Jong Hwan Park, Dong Hoon Lee 0001 Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chosen Ciphertext Security, Hierarchical Identity Based Encryption
41Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
40Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Jonathan Katz, Moti Yung Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
40Ran Canetti, Shafi Goldwasser An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
40Victor Shoup, Rosario Gennaro Securing Threshold Cryptosystems against Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
40Yuliang Zheng 0001, Jennifer Seberry Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
40Ivan Damgård Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
35Jin Li 0002, Kui Ren 0001, Bo Zhu 0001, Zhiguo Wan Privacy-Aware Attribute-Based Encryption with User Accountability. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Attribute-based, Access control, Anonymity, Accountability, Ciphertext-policy
35Guilhem Castagnos, Damien Vergnaud Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks
35Yehuda Lindell A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Adaptive chosen-ciphertext attacks, Simulation-sound non-interactive zero-knowledge, Public-key encryption
35Eun-Jun Yoon, Kee-Young Yoo An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. Search on Bibsonomy SOFSEM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery
35Serge Mister, Robert J. Zuccherato An Attack on CFB Mode Encryption as Used by OpenPGP. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP
35Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen Adaptive-CCA on OpenPGP Revisited. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Chosen ciphertext attack (CCA), Encryption mode, Message format, E-mail, PGP, OpenPGP
35Kouichi Sakurai, Tsuyoshi Takagi On the Security of a Modified Paillier Public-Key Primitive. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack
35Nicolas T. Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
35Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
35Siguna Müller On the Security of Williams Based Public Key Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF (Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness
35David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
35Eiichiro Fujisaki, Tatsuaki Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption
35Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway Relations Among Notions of Security for Public-Key Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness
34Shucheng Yu, Cong Wang 0001, Kui Ren 0001, Wenjing Lou Attribute based data sharing with attribute revocation. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF revocation, attribute based encryption, proxy re-encryption
34Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani Stream-based cipher feedback mode in wireless error channel. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
34Chik How Tan Signcryption Scheme in Multi-user Setting without Random Oracles. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decisional bilinear Diffie-Hellman assumption, Signcryption
34Zhenchuan Chai, Zhenfu Cao, Yuan Zhou Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-user cryptography, proven security, random oracle, ID-based cryptography
34Cheng-Kang Chu, Wen-Guey Tzeng Identity-Based Proxy Re-encryption Without Random Oracles. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption, Proxy re-encryption
34Rui Xue 0001, Dengguo Feng Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Goce Jakimoski, Yvo Desmedt Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis
34Yuji Watanabe, Masayuki Numao Conditional Cryptographic Delegation for P2P Data Sharing. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Mihir Bellare, Amit Sahai Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
34Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
34Yair Frankel, Moti Yung Cryptanalysis of the Immunized LL Public Key Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
34Norman Proctor A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
32Piyi Yang, Zhenfu Cao, Xiaolei Dong Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack
32MoonShik Lee, Daegun Ma, MinJae Seo Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public-key traitor tracing, black-box tracing, self-defensive pirates, linear attack, cryptanalysis
32Aggelos Kiayias, Serdar Pehlivanoglu On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF blackbox tracing, public key cryptosystem, traitor tracing
32Dan Boneh, Moni Naor Traitor tracing with constant size ciphertext. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, traitor tracing, fingerprinting codes
32Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Nicolas Gama, Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Ueli M. Maurer, Johan Sjödin A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Eike Kiltz Chosen-Ciphertext Security from Tag-Based Encryption. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Antoine Joux, Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear map
32Sanjit Chatterjee, Palash Sarkar 0001 Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-receiver encryption, bilinear pairing, identity based encryption
32Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pairings, Signcryption, identity-based cryptography
32Dan Boneh, Xavier Boyen, Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Dan Boneh, Xavier Boyen, Eu-Jin Goh Hierarchical Identity Based Encryption with Constant Size Ciphertext. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Tatsuyuki Matsushita, Hideki Imai A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key traitor tracing, Black-box tracing, Self-defensive pirates
32Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 2-adic expansion, Stream cipher, Self-synchronizing, Feedback shift register
32Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Yevgeniy Dodis, Nelly Fazio Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Philip D. MacKenzie An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Kahil Jallad, Jonathan Katz, Bruce Schneier Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Éliane Jaulmes, Antoine Joux A Chosen-Ciphertext Attack against NTRU. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Charles Rackoff, Daniel R. Simon Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
29Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1611 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license