ASIACRYPT   2008 International Conference on Cryptology
Wall of Fame | Most Viewed ASIACRYPT-2008 Paper
12 years 3 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source159
2Download preprint from source152
3Download preprint from source146
4Download preprint from source143
5Download preprint from source140
6Download preprint from source133
7Download preprint from source133
8Download preprint from source131
9Download preprint from source126
10Download preprint from source121
11Download preprint from source116
12Download preprint from source116
13Download preprint from source115
14Download preprint from source109
15Download preprint from source106
16Download preprint from source102
17Download preprint from source101
18Download preprint from source101
19Download preprint from source100
20Download preprint from source99
21Download preprint from source87
22Download preprint from source86
23Download preprint from source85