Using Hash Functions as a Hedge against Chosen Ciphertext Attack (2000)

by Victor Shoup
Citations:67 - 7 self

Documents Related by Co-Citation

1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
460 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
338 Noninteractive Zero-knowledge Proof of Knowledge and Chosen Ciphertext Attack – C Rackoff, D R Simon - 1991
139 Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption – Ronald Cramer, Victor Shoup - 2001
189 Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack – Ronald Cramer, Victor Shoup - 2001
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
171 Secure Integration of Asymmetric and Symmetric Encryption Schemes – Eiichiro Fujisaki, Tatsuaki Okamoto - 1999
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
447 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
109 Securing Threshold Cryptosystems against Chosen Ciphertext Attack – V. Shoup, R. Gennaro - 1998
60 Simplified OAEP for the RSA and Rabin Functions – D Boneh - 2001
220 Lower Bounds for Discrete Logarithms and Related Problems – Victor Shoup - 1997
725 Pseudo-Random Generation from One-Way Functions – Johan HÃ¥stad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988
249 Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks – Moni Naor, Moti Yung - 1995
1109 A public key cryptosystem and a signature scheme based on discrete logarithms – T ElGamal - 1985
96 OAEP Reconsidered – Victor Shoup - 2000
198 The Decision Diffie-Hellman Problem – Dan Boneh - 1998
114 Moni Naor. Nonmalleable cryptography – Danny Dolev, Cynthia Dwork