Search

Your search keyword '"random oracle model"' showing total 1,304 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model"
1,304 results on '"random oracle model"'

Search Results

251. Certificate-Based Conditional Proxy Re-Encryption

252. Proofs of Space: When Space Is of the Essence

253. Faster Maliciously Secure Two-Party Computation Using the GPU

254. DAA-Related APIs in TPM 2.0 Revisited

255. Forward-Secure Distributed Encryption

256. Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited

257. Certified Bitcoins

258. Research on Identity-based Batch Anonymous Authentication Scheme for VANET.

259. Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model.

260. An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.

261. A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks.

262. On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model.

263. Universally composable oblivious transfer from ideal lattice.

265. PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network.

266. Multi-user security bound for filter permutators in the random oracle model.

267. Secure CLS and CL-AS schemes designed for VANETs.

268. Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.

269. Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.

270. Identity-based Deniable Authenticated Encryption for E-voting Systems.

271. A New Certificateless Signature Scheme Provably Secure in the Standard Model.

272. 可证安全的无对运算的无证书签密方案.

273. An improved anonymous authentication scheme for distributed mobile cloud computing services.

274. MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids.

275. Quantum Security of Subset Cover Problems

276. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network

278. On the Security of One-Witness Blind Signature Schemes

279. Identity-Based Identification Schemes from ID-KEMs

280. Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round

281. Election Verifiability or Ballot Privacy: Do We Need to Choose?

282. Symbolic Probabilistic Analysis of Off-Line Guessing

283. Automated Security Proofs for Almost-Universal Hash for MAC Verification

284. Practical Secure Logging: Seekable Sequential Key Generators

285. Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits

286. Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation

287. On the Security of the TLS Protocol: A Systematic Analysis

288. Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices

289. Outsourced Pattern Matching

290. Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size

291. Fast and Maliciously Secure Two-Party Computation Using the GPU

292. Threshold-Oriented Optimistic Fair Exchange

293. Forward Secure Certificateless Proxy Signature Scheme

294. Homomorphic Encryption with Access Policies: Characterization and New Constructions

295. Nested Merkle’s Puzzles against Sampling Attacks

296. Resource-Restricted Indifferentiability

297. Randomness-Dependent Message Security

298. Signatures of Correct Computation

299. On the (In)security of Fischlin’s Paradigm

300. Tighter Reductions for Forward-Secure Signature Schemes

Catalog

Books, media, physical & digital resources