1,304 results on '"random oracle model"'
Search Results
452. Zero Knowledge in the Random Oracle Model, Revisited
453. On the Analysis of Cryptographic Assumptions in the Generic Ring Model
454. Signature Schemes with Bounded Leakage Resilience
455. Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
456. Security Notions and Generic Constructions for Client Puzzles
457. Unconditionally Secure Blind Signatures
458. Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
459. Client-Server Password Recovery : (Extended Abstract)
460. Twin Signature Schemes, Revisited
461. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
462. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
463. Anonymous Conditional Proxy Re-encryption without Random Oracle
464. On the Security of Identity Based Ring Signcryption Schemes
465. Robust Authentication Using Physically Unclonable Functions
466. Formal Indistinguishability Extended to the Random Oracle Model
467. A Three-Property-Secure Hash Function
468. Merkle Puzzles Are Optimal — An O(n 2)-Query Attack on Any Key Exchange from a Random Oracle
469. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
470. Strongly Secure Certificateless Key Agreement
471. Identity Based Group Signatures from Hierarchical Identity-Based Encryption
472. Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
473. Privacy-Preserving Policy-Based Information Transfer
474. Fair Threshold Decryption with Semi-Trusted Third Parties
475. A New Strongly Secure Authenticated Key Exchange Protocol
476. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles
477. A Schnorr-Like Lightweight Identity-Based Signature Scheme
478. Novel Efficient Certificateless Aggregate Signatures
479. Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions
480. Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
481. Efficient Deniable Authentication for Signatures : Application to Machine-Readable Travel Document
482. Formal Certification of ElGamal Encryption : A Gentle Introduction to CertiCrypt
483. Inter-domain Identity-Based Proxy Re-encryption
484. On the Portability of Generalized Schnorr Proofs
485. Realizing Hash-and-Sign Signatures under Standard Assumptions
486. Salvaging Merkle-Damgård for Practical Applications
487. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
488. Strengthening Security of RSA-OAEP
489. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
490. Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
491. Compact CCA-Secure Encryption for Messages of Arbitrary Length
492. Security of Blind Signatures under Aborts
493. Non-malleable Obfuscation
494. Lattice-based Cryptography
495. Novel efficient identity-based signature on lattices
496. Public key encryption with equality test from generic assumptions in the random oracle model.
497. New technique for chosen-ciphertext security based on non-interactive zero-knowledge.
498. Separable Threshold Decryption for Ad Hoc Wireless Networks
499. Additional Topics in Cryptography
500. Building a Collision-Resistant Compression Function from Non-compressing Primitives : (Extended Abstract)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.