Search

Your search keyword '"random oracle model"' showing total 1,304 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model"
1,304 results on '"random oracle model"'

Search Results

451. Fully Robust Tree-Diffie-Hellman Group Key Exchange

452. Zero Knowledge in the Random Oracle Model, Revisited

453. On the Analysis of Cryptographic Assumptions in the Generic Ring Model

454. Signature Schemes with Bounded Leakage Resilience

455. Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures

456. Security Notions and Generic Constructions for Client Puzzles

457. Unconditionally Secure Blind Signatures

458. Revisiting DoS Attacks and Privacy in RFID-Enabled Networks

459. Client-Server Password Recovery : (Extended Abstract)

460. Twin Signature Schemes, Revisited

461. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions

462. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

463. Anonymous Conditional Proxy Re-encryption without Random Oracle

464. On the Security of Identity Based Ring Signcryption Schemes

465. Robust Authentication Using Physically Unclonable Functions

466. Formal Indistinguishability Extended to the Random Oracle Model

467. A Three-Property-Secure Hash Function

468. Merkle Puzzles Are Optimal — An O(n 2)-Query Attack on Any Key Exchange from a Random Oracle

469. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

470. Strongly Secure Certificateless Key Agreement

471. Identity Based Group Signatures from Hierarchical Identity-Based Encryption

472. Security of Verifiably Encrypted Signatures and a Construction without Random Oracles

473. Privacy-Preserving Policy-Based Information Transfer

474. Fair Threshold Decryption with Semi-Trusted Third Parties

475. A New Strongly Secure Authenticated Key Exchange Protocol

476. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles

477. A Schnorr-Like Lightweight Identity-Based Signature Scheme

478. Novel Efficient Certificateless Aggregate Signatures

479. Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions

480. Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment

481. Efficient Deniable Authentication for Signatures : Application to Machine-Readable Travel Document

482. Formal Certification of ElGamal Encryption : A Gentle Introduction to CertiCrypt

483. Inter-domain Identity-Based Proxy Re-encryption

484. On the Portability of Generalized Schnorr Proofs

485. Realizing Hash-and-Sign Signatures under Standard Assumptions

486. Salvaging Merkle-Damgård for Practical Applications

487. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)

488. Strengthening Security of RSA-OAEP

489. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption

490. Revocable Group Signature Schemes with Constant Costs for Signing and Verifying

491. Compact CCA-Secure Encryption for Messages of Arbitrary Length

492. Security of Blind Signatures under Aborts

493. Non-malleable Obfuscation

496. Public key encryption with equality test from generic assumptions in the random oracle model.

497. New technique for chosen-ciphertext security based on non-interactive zero-knowledge.

500. Building a Collision-Resistant Compression Function from Non-compressing Primitives : (Extended Abstract)

Catalog

Books, media, physical & digital resources