Using Hash Functions as a Hedge against Chosen Ciphertext Attack (2000)

by Victor Shoup
Citations:67 - 7 self

Active Bibliography

3 ACE: The Advanced Cryptographic Engine – Thomas Schweinberger, Victor Shoup - 2000
1 ACE Encrypt: The Advanced Cryptographic Engine’s Public Key Encryption Scheme ∗ – Thomas Schweinberger, Victor Shoup - 2000
189 Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack – Ronald Cramer, Victor Shoup - 2001
460 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
111 A Proposal for an ISO Standard for Public Key Encryption (version 2.0) – Victor Shoup - 2001
76 On Formal Models for Secure Key Exchange – Victor Shoup, Victor Shoup - 1999
29 Why Chosen Ciphertext Security Matters – Victor Shoup, Victor Shoup - 1998
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
239 Optimistic fair exchange of digital signatures – N. Asokan, Victor Shoup, Michael Waidner - 1998
40 Chosen-Ciphertext Security for any One-Way Cryptosystem – David Pointcheval - 2000
Président du jury: – Le Chiffrement Asymétrique, Et La Sécurité Prouvée, David Pointcheval, Gilles Kahn, Dan Boneh, Anca Muscholl, Adi Shamir, École Normale Supérieure, Brigitte Vallée, Moti Yung
93 Key-privacy in public-key encryption – Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval - 2001
1123 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
A New Family of Practical Non-Malleable Protocols – Andrew C. Yao, et al. - 2011
Security of Signed ElGamal Encryption (Extended Abstract) – Claus Peter Schnorr, Markus Jakobsson - 2000
2 A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack – Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup - 2009
1 Multi-Recipient Encryption Schemes: Efficient Constructions and their Security – M. Bellare, A. Boldyreva, K. Kurosawa, J. Staddon
135 Practical Verifiable Encryption and Decryption of Discrete Logarithms – Jan Camenisch, Victor Shoup - 2003
20 Secure Hashed Diffie-Hellman over Non-DDH Groups – Rosario Gennaro, Hugo Krawczyk, Tal Rabin - 2004