Search

Your search keyword '"public-key encryption"' showing total 21 results

Search Constraints

Start Over You searched for: Descriptor "public-key encryption" Remove constraint Descriptor: "public-key encryption" Topic chosen-ciphertext security Remove constraint Topic: chosen-ciphertext security
21 results on '"public-key encryption"'

Search Results

1. 公钥加密综述.

2. Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.

3. Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions

4. Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing

5. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

6. Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter

7. Circular Chosen-Ciphertext Security with Compact Ciphertexts

8. Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions

9. A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems

10. Chosen-Ciphertext Secure RSA-Type Cryptosystems

11. The Group of Signed Quadratic Residues and Applications

12. Practical Chosen Ciphertext Secure Encryption from Factoring

13. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption

14. Novel construction of forward-secure public-key encryption in the standard model

15. Chosen-Ciphertext Security from Identity-Based Encryption

17. Post-challenge leakage in public-key encryption.

18. An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.

19. Practical Chosen Ciphertext Secure Encryption from Factoring.

20. CHOSEN-CIPHERTEXT SECURITY FROM IDENTITY-BASED ENCRYPTION.

21. Chosen-Ciphertext Security from Subset Sum

Catalog

Books, media, physical & digital resources