Adaptively Single-Key Secure Constrained PRFs for mathrm NC^1. | 0 | 0.34 | 2019 |
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction. | 0 | 0.34 | 2016 |
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption. | 0 | 0.34 | 2015 |
Signature schemes with a fuzzy private key | 4 | 0.69 | 2015 |
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. | 0 | 0.34 | 2015 |
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. | 7 | 0.44 | 2015 |
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. | 2 | 0.36 | 2015 |
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions. | 0 | 0.34 | 2014 |
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks. | 1 | 0.35 | 2014 |
More Constructions Of Re-Splittable Threshold Public Key Encryption | 1 | 0.35 | 2014 |
Anonymous Data Collection System With Mediators | 0 | 0.34 | 2014 |
Reducing Public Key Sizes In Bounded Cca-Secure Kems With Optimal Ciphertext Length | 0 | 0.34 | 2013 |