1,322 results on '"random oracle model"'
Search Results
552. An Elliptic Curve Backdoor Algorithm for RSASSA
553. Hiding Information Hiding
554. Designated Verifier Signature: Definition, Framework and New Constructions
555. Efficient Identity-Based Signcryption Scheme for Multiple Receivers
556. Identity-Based Proxy Signature from Pairings
557. General and Efficient Certificateless Public Key Encryption Constructions
558. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
559. Hash-and-Sign with Weak Hashing Made Secure
560. Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM
561. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
562. Generic Certificateless Key Encapsulation Mechanism
563. Unrestricted Aggregate Signatures
564. A 'proof-reading' of Some Issues in Cryptography
565. Efficient Certificateless Signature Schemes
566. Gradually Convertible Undeniable Signatures : (Michels-Petersen-Horster Convertible Undeniable Signatures Revisited)
567. Simulatable Adaptive Oblivious Transfer
568. General Ad Hoc Encryption from Exponent Inversion IBE
569. Non-interactive Proofs for Integer Multiplication
570. Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
571. Batch Verification of Short Signatures
572. An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess’s Scheme
573. A Novel Verifiably Encrypted Signature Scheme Without Random Oracle
574. A Sanitizable Signature Scheme with Aggregation
575. Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
576. Traceable Ring Signature
577. Optimistic Fair Exchange in a Multi-user Setting
578. A Closer Look at PKI: Security and Efficiency
579. Controllable Ring Signatures
580. Designated Confirmer Signatures Revisited
581. Efficient KEMs with Partial Message Recovery
582. On the Key-Privacy Issue of McEliece Public-Key Encryption
583. New Efficient Certificateless Signature Scheme
584. (Convertible) Undeniable Signatures Without Random Oracles
585. Transitive Signatures from Braid Groups
586. Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues
587. Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
588. Authenticated Key Exchange and Key Encapsulation in the Standard Model
589. Miniature CCA2 PK Encryption: Tight Security Without Redundancy
590. Blind Identity-Based Encryption and Simulatable Oblivious Transfer
591. On Privacy Models for RFID
592. Decryptable Searchable Encryption
593. A Provably Secure Ring Signature Scheme in Certificateless Cryptography
594. A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
595. Generic Certificateless Encryption in the Standard Model
596. Pairing-Based Onion Routing
597. Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
598. Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems : (Extended Abstract)
599. Efficient Password-Based Authenticated Key Exchange Without Public Information
600. Generalized Key Delegation for Hierarchical Identity-Based Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.