Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods | 0 | 0.34 | 2021 |
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption. | 0 | 0.34 | 2020 |
Improving Practical UC-Secure Commitments based on the DDH Assumption. | 2 | 0.39 | 2016 |
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. | 3 | 0.37 | 2016 |
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015. | 0 | 0.34 | 2015 |
Post-Challenge Leakage Resilient Public-Key Cryptosystem In Split State Model | 0 | 0.34 | 2015 |
Non-Malleable Multiple Public-Key Encryption | 0 | 0.34 | 2014 |
Secure Integration of Asymmetric and Symmetric Encryption Schemes | 436 | 41.97 | 2013 |
A Multi-Trapdoor Commitment Scheme from the RSA Assumption. | 0 | 0.34 | 2012 |
A Multi-trapdoor Commitment Scheme from the RSA Assumption | 3 | 0.39 | 2012 |
A Framework for Efficient Fully-Equipped UC Commitments. | 1 | 0.35 | 2012 |
New constructions of efficient simulation-sound commitments using encryption and their applications | 3 | 0.38 | 2012 |
An Efficient Non-interactive Universally Composable String-Commitment Scheme. | 0 | 0.34 | 2012 |
Sub-linear Size Traceable Ring Signatures without Random Oracles | 5 | 0.42 | 2012 |
Sub-linear Size Traceable Ring Signatures without Random Oracles | 5 | 0.42 | 2012 |
Sub-Linear Size Traceable Ring Signatures without Random Oracles. | 0 | 0.34 | 2012 |
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions | 0 | 0.34 | 2009 |
Efficient Non-interactive Universally Composable String-Commitment Schemes | 16 | 0.63 | 2009 |
Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings | 19 | 1.48 | 2008 |
Special Section on Cryptography and Information Security | 0 | 0.34 | 2008 |
Formal security treatments for signatures from identity-based encryption | 7 | 0.45 | 2007 |
Security of ESIGN-PSS | 1 | 0.35 | 2007 |
Formal Security Treatments For Ibe-To-Signature Transformation: Relations Among Security Notions | 11 | 0.56 | 2007 |
Traceable Ring Signature | 13 | 0.59 | 2006 |
Plaintext Simulatability | 4 | 0.39 | 2006 |
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting | 0 | 0.34 | 2006 |
Plaintext-Simulatability. | 0 | 0.34 | 2004 |
RSA-OAEP Is Secure under the RSA Assumption | 154 | 9.88 | 2004 |
A Simple Approach To Secretly Sharing A Factoring Witness In A Publicly-Verifiable Manner | 0 | 0.34 | 2002 |
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order | 130 | 4.71 | 2002 |
An Integer Commitment Scheme based on Groups with Hidden Order. | 47 | 3.79 | 2001 |
How to Enhance the Security of Public-Key Encryption at Minimum Cost | 143 | 7.23 | 1999 |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications | 88 | 5.79 | 1998 |
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations | 276 | 21.87 | 1997 |
Practical Escrow Cash System | 16 | 0.89 | 1996 |
How to Date Blind Signatures | 138 | 5.57 | 1996 |
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn | 5 | 1.04 | 1992 |