4.5 Article

Secure Integration of Asymmetric and Symmetric Encryption Schemes

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Chosen-ciphertext security from identity-based encryption

Dan Boneh et al.

SIAM JOURNAL ON COMPUTING (2006)

Article Computer Science, Theory & Methods

Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack

R Cramer et al.

SIAM JOURNAL ON COMPUTING (2003)

Article Computer Science, Theory & Methods

How to protect DES against exhaustive key search (an analysis of DESX)

J Kilian et al.

JOURNAL OF CRYPTOLOGY (2001)

Article Computer Science, Theory & Methods

Nonmalleable cryptography

D Dolev et al.

SIAM JOURNAL ON COMPUTING (2000)