Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428131
DOI10.1007/b11817zbMath1122.94381OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428131
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Related Items (8)
On the Joint Security of Encryption and Signature in EMV ⋮ You can sign but not decrypt: hierarchical integrated encryption and signature ⋮ Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) ⋮ Chosen Ciphertext Security with Optimal Ciphertext Overhead ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model ⋮ Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting
This page was built for publication: Advances in Cryptology - CRYPTO 2003