1 |
A.W. Dent, 'A designer's guide to KEMs', Cryptography and Coding, Lecture Notes in Comput. Sci. 2898, pp. 133-151. 2003
DOI
|
2 |
S. Luck, 'A variant of the Cramer-Shoup cryptosystem for groups of unknown order'. Advances in Cryptology ASIACRYPT 2002. Lecture Notes In Comput. Sci. 2501. pp. 27-45. 2002
DOI
ScienceOn
|
3 |
V. Shoup. 'A proposal for an ISO standard for public key encryption (version 2.1)'. Cryptology ePrint Archive, Report 2001/112. 2001
|
4 |
V. Shoup. 'Using hash functions as a hedge against chosen ciphertext attack',Advances in Cryptology - EUROCRYPT 2000. Lecture Notes in Comput. Sci. 1807. pp. 275-288. 2000
DOI
ScienceOn
|
5 |
Y. Tsiounis. M. Yung, 'On the security of ElGamal based encryption'. Advances in Clyptology - ASIACRYPT 2000, Lecture Notes in Comput. Sci. 1431. pp. 117-132. 1998
DOI
ScienceOn
|
6 |
R. Cramer, V. Shoup, 'Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack', SIAM J. Comput., 33(1), pp. 167-226, 2003
DOI
ScienceOn
|
7 |
M. Bellare, P. Rogaway, 'Optimal asymmetric encryption padding - How to encrypt with RSA', Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Comput. Sci. 950, pp. 92-111, 1994
|
8 |
B. Preneel. A. Biryukov. E. Oswald. B. van Rompay. L. Granboulan. E. Dottax.S. Murphy. A. Dent. J. White, M. Dichtl. S. Pyka, M. Schafheutle, P. Serf. E. Biham, E. Barkan. O. Dunkelman. M. Ciet, F. Sica. L. Knudsen. H. Raddum,'NESSIE security report (NESSIE Deliverable D20. version 2.0)', 2003
|
9 |
Information-technology Promotion Agency, Telecommunications Advancement Organization of Japan, 'CRYPTREC Report 2002', 2003
|
10 |
R. Gennaro, V. Shoup, 'A note on an encryption scheme of Kurosawa and Desmedt', Cryptology ePrint Archive, Report 2004/196, 2004
|
11 |
International Organization for Standardization, 'ISO/IEC CD 18033-2, IT Security techniques - Encryption algorithms - Part 2: AsymmetIic ciphei', 2004
|
12 |
T. ElGamal. 'A public key cryptosystem and a signature scheme based on discrete logarithms', IEEE Trans. Info. Theory, 31, pp. 469-472, 1985
DOI
|
13 |
M. Bellare, A Desai. D. Pointcheval. P. Rogaway, 'Relations among notions of security for public-key encryption schemes', Advances in Cryptology CRYPTO' 98, Lecture Notes in Comput. Sci. 1462, pp. 26-46, 1998
DOI
ScienceOn
|
14 |
K. Kurosawa, Y. Desmedt, Advances in Cryptology - CRYPTO 2004, Lecture Notes in Comput. Sci. 3152, pp. 426-442, 2004
DOI
|