Key-Privacy in Public-Key Encryption
Top Cited Papers
- 20 November 2001
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 566-582
- https://doi.org/10.1007/3-540-45682-1_33
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- SKEME: a versatile secure key exchange mechanism for InternetPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Number-theoretic constructions of efficient pseudo-random functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A concrete security treatment of symmetric encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2001
- Advances in Cryptology — CRYPTO 2000Lecture Notes in Computer Science, 2000
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- A hard-core predicate for all one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- How to construct random functionsJournal of the ACM, 1986
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985