Pages that link to "Item:Q5451042"
From MaRDI portal
The following pages link to On the Generic Insecurity of the Full Domain Hash (Q5451042):
Displaying 34 items.
- Unprovable security of perfect NIZK and non-interactive non-malleable commitments (Q332270) (← links)
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Possibility and impossibility results for selective decommitments (Q451116) (← links)
- Non-adaptive programmability of random oracle (Q500974) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Optimal security proofs for full domain hash. Revisited (Q1747667) (← links)
- Black-box use of one-way functions is useless for optimal fair coin-tossing (Q2096541) (← links)
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption (Q2152147) (← links)
- Public key encryption with equality test from generic assumptions in the random oracle model (Q2215090) (← links)
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives (Q2220875) (← links)
- Public key encryption with equality test via hash proof system (Q2330090) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Instantiability of RSA-OAEP under chosen-plaintext attack (Q2408591) (← links)
- On tight security proofs for Schnorr signatures (Q2423848) (← links)
- How (not) to design strong-RSA signatures (Q2430687) (← links)
- Public key encryption with equality test in the standard model (Q2660898) (← links)
- A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation (Q2827742) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening (Q3627426) (← links)
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model (Q3627447) (← links)
- (Q4536804) (← links)
- Toward RSA-OAEP Without Random Oracles (Q5041161) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Leaky Random Oracle (Extended Abstract) (Q5505472) (← links)
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model (Q6157502) (← links)
- Augmented random oracles (Q6163941) (← links)
- Linkable ring signature scheme with stronger security guarantees (Q6595333) (← links)
- Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness (Q6617635) (← links)
- New limits of provable security and applications to ElGamal encryption (Q6637527) (← links)