A Designer’s Guide to KEMs
- 1 January 2003
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext AttackSIAM Journal on Computing, 2003
- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown OrderLecture Notes in Computer Science, 2002
- The Gap-Problems: A New Class of Problems for the Security of Cryptographic SchemesLecture Notes in Computer Science, 2001
- On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOCLecture Notes in Computer Science, 2001
- Why Textbook ElGamal and RSA Encryption Are InsecureLecture Notes in Computer Science, 2000
- REACT: Rapid Enhanced-Security Asymmetric Cryptosystem TransformLecture Notes in Computer Science, 2000
- How to Enhance the Security of Public-Key Encryption at Minimum CostLecture Notes in Computer Science, 1999
- Relations among notions of security for public-key encryption schemesPublished by Springer Science and Business Media LLC ,1998
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- New directions in cryptographyIEEE Transactions on Information Theory, 1976