Sciweavers

93
Voted
PKC
2015
Springer
14views Cryptology» more  PKC 2015»
9 years 11 months ago
How Secure is Deterministic Encryption?
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
65
Voted
PKC
2015
Springer
10views Cryptology» more  PKC 2015»
9 years 11 months ago
On the Selective Opening Security of Practical Public-Key Encryption Schemes
We show that two well-known and widely employed public-key encryption schemes – RSA Optimal Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Sch...
Felix Heuer, Tibor Jager, Eike Kiltz, Sven Sch&aum...
69
Voted
PKC
2015
Springer
19views Cryptology» more  PKC 2015»
9 years 11 months ago
Divisible E-Cash Made Practical
the Full Version of the Extended Abstract that appears in the Proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’15) (30 Mar...
Sébastien Canard, David Pointcheval, Olivie...
77
Voted
PKC
2015
Springer
19views Cryptology» more  PKC 2015»
9 years 11 months ago
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. ...
82
Voted
PKC
2015
Springer
17views Cryptology» more  PKC 2015»
9 years 11 months ago
Adaptive Proofs of Knowledge in the Random Oracle Model
We formalise the notion of adaptive proofs of knowledge in the random oracle model, where the extractor has to recover witnesses for multiple, possibly adaptively chosen statements...
David Bernhard, Marc Fischlin, Bogdan Warinschi