Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (1995)

Cached

Download Links

by Moni Naor , Moti Yung
Venue:In Proc. of the 22nd STOC
Citations:249 - 15 self

Documents Related by Co-Citation

447 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
338 Noninteractive Zero-knowledge Proof of Knowledge and Chosen Ciphertext Attack – C Rackoff, D R Simon - 1991
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
447 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
356 A hard-core predicate for all one-way functions – Oded Goldreich, Leonid A. Levint - 1989
238 Optimal Asymmetric Encryption – Mihir Bellare, Phillip Rogaway - 1994
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
149 Number-theoretic constructions of efficient pseudo-random functions – Moni Naor, Omer Reingold - 1997
460 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
513 Theory and Application of Trapdoor Functions – A C Yao - 1982
220 Lower Bounds for Discrete Logarithms and Related Problems – Victor Shoup - 1997
204 Optimal Asymmetric Encryption – How to Encrypt with RSA – Mihir Bellare, Phillip Rogaway - 1995
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
16 Towards practical public-key cryptosystems provably-secure against chosen ciphertext attacks – I B Damg˚ard - 1991