Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization (1999)

by Mihir Bellare , Amit Sahai
Citations:56 - 7 self

Active Bibliography

3 Simulation-Sound Non-Interactive Zero Knowledge – Amit Sahai - 2001
13 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
5 On Chosen Ciphertext Security of Multiple Encryptions – Oded Goldreich, Yoad Lustig, Moni Naor - 2002
Submission to IEEE P1363a. DHAES: An Encryption Scheme Based on the Di e-Hellman Problem – Michel Abdalla, Mihir Bellare Y, Phillip Rogaway Z - 1998
42 Towards plaintext-aware public-key encryption without random oracles – Mihir Bellare, Adriana Palacio - 2004
29 Extended Notions of Security for Multicast Public Key Cryptosystems – Olivier Baudron, David Pointcheval, Jacques Stern - 2000
35 Relaxing chosen-ciphertext security – Ran Canetti, Hugo Krawczyk, Jesper B. Nielsen - 2003
93 Key-privacy in public-key encryption – Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval - 2001
221 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
1334 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
123 The order of encryption and authentication for protecting communications (or: how Secure is SSL?) – Hugo Krawczyk - 2001
201 Chosen-Ciphertext Security from Identity-Based Encryption. Adv – Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz - 2004
10 New paradigms for constructing symmetric encryption schemes secure against chosen ciphertext attack – Anand Desai - 2000
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
On a Zero-Knowledge Property of Arguments of Knowledge Based on Secure Public Key Encryption Schemes – Yodai Watanabe - 2004
2 On sufficient randomness for secure public-key cryptosystems – Takeshi Koshiba - 2002
Public-key cryptography and password protocols – Hugo Krawczyky - 1999
105 Public-Key Cryptography and Password Protocols – Shai Halevi, Hugo Krawczyk - 1999
On the Security of a Williams Based Public Key Encryption Scheme – Siguna Müller