References
- M. Bellare, A Desai. D. Pointcheval. P. Rogaway, 'Relations among notions of security for public-key encryption schemes', Advances in Cryptology CRYPTO' 98, Lecture Notes in Comput. Sci. 1462, pp. 26-46, 1998 https://doi.org/10.1007/BFb0055718
- M. Bellare, P. Rogaway, 'Optimal asymmetric encryption padding - How to encrypt with RSA', Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Comput. Sci. 950, pp. 92-111, 1994
- R. Cramer, V. Shoup, 'Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack', SIAM J. Comput., 33(1), pp. 167-226, 2003 https://doi.org/10.1137/S0097539702403773
- A.W. Dent, 'A designer's guide to KEMs', Cryptography and Coding, Lecture Notes in Comput. Sci. 2898, pp. 133-151. 2003 https://doi.org/10.1007/978-3-540-40974-8_12
- T. ElGamal. 'A public key cryptosystem and a signature scheme based on discrete logarithms', IEEE Trans. Info. Theory, 31, pp. 469-472, 1985 https://doi.org/10.1109/TIT.1985.1057074
- R. Gennaro, V. Shoup, 'A note on an encryption scheme of Kurosawa and Desmedt', Cryptology ePrint Archive, Report 2004/196, 2004
- Information-technology Promotion Agency, Telecommunications Advancement Organization of Japan, 'CRYPTREC Report 2002', 2003
- International Organization for Standardization, 'ISO/IEC CD 18033-2, IT Security techniques - Encryption algorithms - Part 2: AsymmetIic ciphei', 2004
- K. Kurosawa, Y. Desmedt, Advances in Cryptology - CRYPTO 2004, Lecture Notes in Comput. Sci. 3152, pp. 426-442, 2004 https://doi.org/10.1007/978-3-540-28628-8_26
- S. Luck, 'A variant of the Cramer-Shoup cryptosystem for groups of unknown order'. Advances in Cryptology ASIACRYPT 2002. Lecture Notes In Comput. Sci. 2501. pp. 27-45. 2002 https://doi.org/10.1007/3-540-36178-2_2
- B. Preneel. A. Biryukov. E. Oswald. B. van Rompay. L. Granboulan. E. Dottax.S. Murphy. A. Dent. J. White, M. Dichtl. S. Pyka, M. Schafheutle, P. Serf. E. Biham, E. Barkan. O. Dunkelman. M. Ciet, F. Sica. L. Knudsen. H. Raddum,'NESSIE security report (NESSIE Deliverable D20. version 2.0)', 2003
- V. Shoup. 'Using hash functions as a hedge against chosen ciphertext attack',Advances in Cryptology - EUROCRYPT 2000. Lecture Notes in Comput. Sci. 1807. pp. 275-288. 2000 https://doi.org/10.1007/3-540-45539-6_19
- V. Shoup. 'A proposal for an ISO standard for public key encryption (version 2.1)'. Cryptology ePrint Archive, Report 2001/112. 2001
- Y. Tsiounis. M. Yung, 'On the security of ElGamal based encryption'. Advances in Clyptology - ASIACRYPT 2000, Lecture Notes in Comput. Sci. 1431. pp. 117-132. 1998 https://doi.org/10.1007/BFb0054019