Author:
Hofheinz Dennis,Kiltz Eike
Publisher
Springer Berlin Heidelberg
Reference30 articles.
1. Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM/DEM: A new framework for hybrid encryption. Cryptology ePrint Archive, Report 2005/027 (2005),
http://eprint.iacr.org/
2. Lecture Notes in Computer Science;M. Abe,2005
3. Bellare, M., Kohno, T., Shoup, V.: Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation. In: ACM CCS 2006, pp. 380–389. ACM Press, New York (2006)
4. Lecture Notes in Computer Science;M. Bellare,2000
5. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62–73. ACM Press, New York (1993)
Cited by
158 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Public Key Encryption with Openings;Lecture Notes in Computer Science;2024
2. Revisiting Anonymity in Post-quantum Public Key Encryption;Lecture Notes in Computer Science;2024
3. Hybrid Encryption;Encyclopedia of Cryptography, Security and Privacy;2024
4. On the Security of Rate-limited Privacy Pass;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. Performance and Comparative Analysis of Elliptic Curve Cryptography and RSA;2023 IEEE East-West Design & Test Symposium (EWDTS);2023-09-22