1 |
Ronald Cramer, and Victor Shoup, 'Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption', EUROCRYPT 2002, LNCS 2332, pp. 45-64, Springer-Verlag, 2002
|
2 |
Tatsuaki Okamoto, Shigenori Uchiyama, 'A New Public-Key Cryptosystem as Secure as Factoring', EUROCRYPT'98, LNCS 1403, pp. 308-318, Springer-Verlag, 1998
|
3 |
Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, 'Provably Secure Length-Saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption', ETRI Journal, Volume 22, Number 4, December 2000
|
4 |
Eike Kiltz and John Malone-Lee, 'A General Construction of IND-CCA2 Secure Public Key Encryption', Cry ptography and Coding 2003, LNCS 2898, pp. 152-166, 2003
|
5 |
A.J. Menezes, P.C. Oorschot, and S.A. Vanstone, 'Handbook of Applied Cryptography', CRC Press, Inc, (1999)
|
6 |
Rene Peralta, 'Report on Integer Factorization', available at http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1025_report.pdf, 2001
|
7 |
Eiichiro Fujisaki, and Tatsuaki Okamoto, 'How to Enhance the Security of Public-Key Encryption at Minimum Cost', PKC'99, LNCS 1560, pp. 53-68, 1999
|
8 |
Pascal Paillier, 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes', EUROCRYPT'99, LNCS 1592, pp. 223-238, Springer-Verlag, 1999
|
9 |
Emmanuel Bresson, Dario Catalano, and David Pointcheval, 'A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications', ASIACRYPT 2003, LNCS 2894, pp. 37-54, Springer-Verlag, 2003
|
10 |
D. Dolev, C. Dwork, and M. Naor, 'Non-malleable cryptography', Proceedings of the 23rd Annual Symposium on Theory of Computing, ACM, 1991
|
11 |
Wenbo Mao, and Chae Hoon Lim, 'Cryptanalysis in Prime Order Subgroups of ', ASIACRYPT'98, LNCS 1514, pp. 214-226, 1998
|
12 |
David Pointcheval, 'Chosen-Ciphertext Security for any One-Way Cryptosystem', Proceedings of PKC'2000, LNCS 1751, pp. 129-146, 2000
|
13 |
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway, 'Relations Among Notions of Security for Public-Key Encryption Schemes', CRYPTO'98, LNCS 1462, pp. 26-46, Springer-Verlag, 1998
|
14 |
W. Diffie, and M. E. Hellman, 'New Directions in Cryptography', IEEE Transactions on Informaion Theory, 22(6), 644-654, 1976
DOI
|
15 |
S. Goldwasser, and S. Micali, 'Probabilistic encryption', Journal of Computer and System Science, Vol.28, No.2, pp.270-299, 1984
DOI
ScienceOn
|