Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sébastien Kunz-Jacques, Frédéric Muller |
New Improvements of Davies-Murphy Cryptanalysis. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Justin Brickell, Vitaly Shmatikov |
Privacy-Preserving Graph Algorithms in the Semi-honest Model. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Cid, Gaëtan Leurent |
An Analysis of the XSL Algorithm. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
XSL algorithm, T? method, AES, Linearization |
1 | Martin Hirt, Jesper Buus Nielsen |
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhifang Zhang, Mulan Liu, Liangliang Xiao |
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
1 | Pil Joong Lee (eds.) |
Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
Secret Handshakes from CA-Oblivious Encryption. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee 0001 |
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
dynamic authenticated group key exchange, ad hoc networks |
1 | Ho-Ick Suk |
Information Security in Korea IT839 Strategy. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Taizo Shirai, Bart Preneel |
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
optimal diffusion mapping, active S-boxes, MDS, Feistel cipher |
1 | Eonkyung Lee |
Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Serge Vaudenay |
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Moti Yung |
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Zulfikar Ramzan |
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis |
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk |
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001 |
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Joydip Mitra, Palash Sarkar 0001 |
Time-Memory Trade-Off Attacks on Multiplications and T-Functions. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
T–functions, cryptanalysis, stream cipher, multiplication, time-memory trade-off |
1 | Berry Schoenmakers, Pim Tuyls |
Practical Two-Party Computation Based on the Conditional Gate. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bartosz Przydatek, Reto Strobl |
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Luca Breveglieri, Alessandra Cherubini, Marco Macchetti |
On the Generalized Linear Equivalence of Functions Over Finite Fields. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
linear equivalence, APN functions, Boolean functions, differential cryptanalysis, S-boxes, linear cryptanalysis |
1 | Mihir Bellare, Adriana Palacio |
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Muller |
The MD2 Hash Function Is Not One-Way. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Hiroki Ueda |
Sieving Using Bucket Sort. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita |
Comparison Between XL and Gröbner Basis Algorithms. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
Multivariate polynomial equations, Solving Systems, Gröbner basis, Semi-regular Sequences, Algebraic attacks, XL algorithm |
1 | Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey |
Privacy in Non-private Environments. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Muxiang Zhang |
New Approaches to Password Authenticated Key Exchange Based on RSA. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Adi Shamir |
Stream Ciphers: Dead or Alive? |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek |
On the Security of MOR Public Key Cryptosystem. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
MOR cryptosystem, group extension, central commutator attack, discrete logarithm problem |
1 | Phillip Rogaway |
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Palash Sarkar 0001 |
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
UOWHF, domain extender, parallel algorithm |
1 | Deukjo Hong, Bart Preneel, Sangjin Lee 0002 |
Higher Order Universal One-Way Hash Functions. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function |
1 | Lan Nguyen, Reihaneh Safavi-Naini |
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Claus Diem |
The XL-Algorithm and a Conjecture from Commutative Algebra. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Isamu Teranishi, Jun Furukawa 0001, Kazue Sako |
k-Times Anonymous Authentication (Extended Abstract). |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti |
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuyuki Matsushita, Hideki Imai |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
Public-key traitor tracing, Black-box tracing, Self-defensive pirates |
1 | Jean Monnerat, Serge Vaudenay |
Generic Homomorphic Undeniable Signatures. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Märt Saarepera |
On Provably Secure Time-Stamping Schemes. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Baignères, Pascal Junod, Serge Vaudenay |
How Far Can We Go Beyond Linear Cryptanalysis? |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
statistical cryptanalysis, Block ciphers, linear cryptanalysis |
1 | Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette |
The Davies-Murphy Power Attack. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, David Pointcheval |
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ian F. Blake, Vladimir Kolesnikov |
Strong Conditional Oblivious Transfer and Computing on Intervals. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard |
The Insecurity of Esign in Practical Implementations. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Wonil Lee, Donghoon Chang, Sangjin Lee 0002, Soo Hak Sung, Mridul Nandi |
New Parallel Domain Extenders for UOWHF. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
UOWHF, masking assignment, sequential construciton, parallel construction, tree based construction, hash function |
1 | Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes 0001, Paul C. Leyland |
Factoring Estimates for a 1024-Bit RSA Modulus. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
1024-bit RSA, TWIRL, factorization, number field sieve |
1 | Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh |
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee |
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
1 | Kaoru Kurosawa, Tsuyoshi Takagi |
Some RSA-Based Encryption Schemes with Tight Security Reduction. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
RSA-Paillier, Rabin-Paillier, Factoring, semantic security, tight reduction |
1 | Miodrag J. Mihaljevic |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption |
1 | Duong Hieu Phan, David Pointcheval |
Chosen-Ciphertext Security without Redundancy. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Huaxiong Wang, Josef Pieprzyk |
Efficient One-Time Proxy Signatures. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jason E. Gower |
Rotations and Translations of Number Field Sieve Polynomials. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Bresson, Dario Catalano, David Pointcheval |
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
Verifiable Homomorphic Oblivious Transfer and Private Equality Test. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption |
1 | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai |
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Mark L. Bauer, Safuat Hamdy |
On Class Group Computations Using the Number Field Sieve. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk |
Universal Designated-Verifier Signatures. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Muller |
A New Attack against Khazad. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Pradeep Kumar Mishra, Palash Sarkar 0001 |
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
hyperelliptic curve cryptography, encapsulated add-and-double, parallel algorithm, Jacobian, explicit formula |
1 | Chi-Sung Laih (eds.) |
Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Breno de Medeiros |
Efficient Group Signatures without Trapdoors. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
privacy and anonymity, cryptographic protocols, Group signatures |
1 | David R. Kohel |
The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
modular curves, point counting, Elliptic curve cryptography |
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Leakage-Resilient Authenticated Key Establishment Protocols. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Jacques Stern |
Almost Uniform Density of Power Residues and the Provable Security of ESIGN. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sattam S. Al-Riyami, Kenneth G. Paterson |
Certificateless Public Key Cryptography. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Wang |
Untraceable Fair Network Payment Protocols with Off-Line TTP. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signatures, Cryptography, Electronic Commerce, Undeniable Signature, Electronic cash, Payment System |
1 | Helger Lipmaa |
On Diophantine Complexity and Statistical Zero-Knowledge Arguments. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
Arguments of knowledge, Diophantine complexity, integer commitment scheme, statistical zero knowledge |
1 | Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi |
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Iwan M. Duursma, Hyang-Sook Lee |
Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi |
Generalized Powering Functions and Their Application to Digital Signatures. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
modular powering function, digital signature, RSA, factoring |
1 | Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle |
Cryptanalysis of 3-Pass HAVAL. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Hong-Sen Yan, Hsing-Hui Huang |
The Secret and Beauty of Ancient Chinese Padlocks. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, David Naccache |
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Thériault |
Index Calculus Attack for Hyperelliptic Curves of Small Genus. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Gene Tsudik, Shouhuai Xu |
Accumulating Composites and Improved Group Signing. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Fangguo Zhang, Kwangjo Kim |
ID-Based Blind Signature and Ring Signature from Pairings. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
Provably security, Bilinear pairings, Blind signature, Ring signature, ID-based cryptography |
1 | Dario Catalano, Phong Q. Nguyen, Jacques Stern |
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key |
1 | Hiroki Koga |
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Eiichiro Fujisaki |
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Alice Silverberg |
Hierarchical ID-Based Cryptography. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography |
1 | Moti Yung |
Crypto-integrity. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee 0002, Seok Won Jung |
Amplified Boomerang Attack against Reduced-Round SHACAL. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
SHACAL, Amplified boomerang attack, Boomerang-distinguisher |
1 | Alejandro Hevia, Daniele Micciancio |
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Chanathip Namprempre |
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Gregory Neven |
Transitive Signatures Based on Factoring and RSA. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
transitive signatures, RSA, Signatures |
1 | Elad Barkan, Eli Biham |
In How Many Ways Can You Write Rijndael? |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Kishan Chand Gupta, Palash Sarkar 0001 |
Improved Construction of Nonlinear Resilient S-Boxes. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
stream cipher, Resiliency, nonlinearity, S-box, algebraic degree, Griesmer bound |
1 | Alexander W. Dent |
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu |
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Moti Yung |
Threshold Cryptosystems Based on Factoring. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki |
1-out-of-n Signatures from a Variety of Keys. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Paolo D'Arco, Douglas R. Stinson |
On Unconditionally Secure Robust Distributed Key Distribution Centers. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer |
Analysis of Bernstein's Factorization Circuit. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Ronald Cramer, Serge Fehr |
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai |
Unconditionally Secure Anonymous Encryption and Group Authentication. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Louis Granboulan |
Short Signatures in the Random Oracle Model. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
random oracle and ideal cipher models, proven security, digital signature, padding |