On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC
- 2 April 2001
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 208-222
- https://doi.org/10.1007/3-540-45353-9_16
Abstract
No abstract availableKeywords
This publication has 33 references indexed in Scilit:
- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacksPublished by Springer Nature ,2001
- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based CharacterizationLecture Notes in Computer Science, 1999
- Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1Lecture Notes in Computer Science, 1998
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackLecture Notes in Computer Science, 1998
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- Enforcing traceability in softwarePublished by Springer Nature ,1997
- A taxonomy for key escrow encryption systemsCommunications of the ACM, 1996
- Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits KnownLecture Notes in Computer Science, 1996
- Protocol failure in the escrowed encryption standardPublished by Association for Computing Machinery (ACM) ,1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993