-
1Table of Contents: “… Ciphertext Attacks -- IBE in Adaptive-Identity Model Without Random Oracles -- Further IBE Constructions…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2002Table of Contents: “…-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack -- Reduction Proofs…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2000Table of Contents: “…XTR and NTRU -- The XTR Public Key System -- A Chosen-Ciphertext Attack against NTRU -- Privacy…”
Full Text via HEAL-Link
Electronic eBook -
4Published 1998Table of Contents: “…Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2004Table of Contents: “… Adversaries -- Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2006Table of Contents: “… Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2006Table of Contents: “… Power Functions -- Stream Ciphers II -- Chosen-Ciphertext Attacks Against MOSQUITO -- Distinguishing…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2013Table of Contents: “… Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2002Table of Contents: “… at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2006Table of Contents: “… and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2019Table of Contents: “…-Ciphertext Attacks against Feistel Ciphers -- Automatic Search for A Variant of Division Property Using Three…”
Full Text via HEAL-Link
Electronic eBook -
12Published 1999Table of Contents: “… Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) -- Proving in Zero-Knowledge…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2015Table of Contents: “… -- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks -- A Fast Phase…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2001Table of Contents: “… -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2007Table of Contents: “…-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2013Table of Contents: “… Leakage Chosen Ciphertext Attacks -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2003Table of Contents: “… Secure against Adaptive Chosen Ciphertext Attack -- Sequential Key Derivation Patterns for Broadcast…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2009Table of Contents: “… against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2015Table of Contents: “… Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2001Table of Contents: “… Cryptosystems Secure against Chosen-Ciphertext Attacks -- Two-Party Protocols -- Oblivious Polynomial Evaluation…”
Full Text via HEAL-Link
Electronic eBook