1,304 results on '"random oracle model"'
Search Results
302. Vector Commitments and Their Applications
303. Decentralized Attribute-Based Signatures
304. Short Pairing-Efficient Threshold-Attribute-Based Signature
305. A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
306. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
307. Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
308. Digital Signatures
309. Identity-Based Cryptography
310. Multi-recipient Signcryption Algorithm for Communication of Mobile Ad Hoc Networks
311. Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model
312. Fast and Private Computation of Cardinality of Set Intersection and Union
313. Dual Form Signatures: An Approach for Proving Security from Static Assumptions
314. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
315. On the Non-malleability of the Fiat-Shamir Transform
316. A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening
317. Certificate-Based Key-Insulated Signature
318. (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack
319. Compact Stateful Encryption Schemes with Ciphertext Verifiability
320. Efficient Two-Move Blind Signatures in the Common Reference String Model
321. Domain-Specific Pseudonymous Signatures for the German Identity Card
322. Revisiting Difficulty Notions for Client Puzzles and DoS Resilience
323. Perfect Keyword Privacy in PEKS Systems
324. Deterministic Random Oracles
325. Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System
326. The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security
327. CommitCoin: Carbon Dating Commitments with Bitcoin : (Short Paper)
328. Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
329. Indifferentiability of Domain Extension Modes for Hash Functions
330. Short and Efficient Identity-Based Undeniable Signature Scheme
331. A New Approach to Practical Active-Secure Two-Party Computation
332. Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys
333. Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
334. Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
335. Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
336. Size-Hiding in Private Set Intersection: Existential Results and Constructions
337. Experimenting with Fast Private Set Intersection
338. Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
339. Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
340. Computationally-Fair Group and Identity-Based Key-Exchange
341. Incremental Deterministic Public-Key Encryption
342. Lattice Signatures without Trapdoors
343. Optimal Security Proofs for Full Domain Hash, Revisited
344. Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
345. On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
346. Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
347. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
348. Secure Two-Party Computation with Low Communication
349. Deniable RSA Signature : The Raise and Fall of Ali Baba
350. Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.