Signcryption schemes with insider security in an ideal permutation model
From MaRDI portal
Publication:2003346
DOI10.1515/JMC-2018-0006zbMath1443.94044OpenAlexW2946285221WikidataQ127879469 ScholiaQ127879469MaRDI QIDQ2003346
Xavier Boyen, Josef Pieprzyk, Tarun Kumar Bansal
Publication date: 8 July 2019
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2018-0006
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A constructive perspective on signcryption security
- OAEP reconsidered
- Secure integration of asymmetric and symmetric encryption schemes
- Tag-KEM/DEM: A new framework for hybrid encryption
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Parallel Signcryption
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
- Efficient Constructions of Signcryption Schemes and Signcryption Composability
- Practical Signcryption
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Keccak
- Advances in Cryptology – CRYPTO 2004
- Cryptography and Coding
- Efficient KEMs with Partial Message Recovery
- On the Indifferentiability of the Sponge Construction
- Information Security and Privacy
- Information Security
- Theory of Cryptography
- Public Key Cryptography - PKC 2006
This page was built for publication: Signcryption schemes with insider security in an ideal permutation model