Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (1995)

Cached

Download Links

by Moni Naor , Moti Yung
Venue:In Proc. of the 22nd STOC
Citations:253 - 18 self

Documents Related by Co-Citation

450 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
340 Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack – C Rackoff, D Simon - 1991
1188 S.: Probabilistic Encryption – S Goldwasser, Micali - 1984
1341 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
452 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
835 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
2928 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
630 How to construct random functions – O Goldreich, S Goldwasser, S Micali - 1986
370 A hard-core predicate for all one-way functions – Oded Goldreich, Leonid A. Levint - 1989
240 Optimal Asymmetric Encryption – Mihir Bellare, Phillip Rogaway - 1994
2728 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
150 Number-theoretic constructions of efficient pseudo-random functions – Moni Naor, Omer Reingold - 1997
463 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
517 Theory and applications of trapdoor functions – A Yao - 1982
223 Lower Bounds for Discrete Logarithms and Related Problems – Victor Shoup - 1997
204 Optimal Asymmetric Encryption – How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1995
2477 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
17 Towards Practical Public-Key Cryptosystems Provably-Secure against Chosen-Ciphertext Attack – I Damg˚ard - 1991