Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited
From MaRDI portal
Publication:2867215
DOI10.1007/978-3-642-42033-7_8zbMath1327.94039OpenAlexW2132328555MaRDI QIDQ2867215
Sandro Coretti, Björn Tackmann, Ueli M. Maurer
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42033-7_8
Related Items (5)
From Indifferentiability to Constructive Cryptography (and Back) ⋮ Composable and finite computational security of quantum message transmission ⋮ Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework) ⋮ Dispelling myths on superposition attacks: formal security model and attack analyses ⋮ Revisiting (R)CCA security and replay protection
This page was built for publication: Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited