Sciweavers

95 search results - page 6 / 19
» Bounded CCA2-Secure Encryption
Sort
View
AFRICACRYPT
2008
Springer
14 years 1 months ago
Lower Bounds for Subset Cover Based Broadcast Encryption
Per Austrin, Gunnar Kreitz
ASIACRYPT
1998
Springer
13 years 11 months ago
Some Bounds and a Construction for Secure Broadcast Encryption
Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike ...
EUROCRYPT
2010
Springer
13 years 11 months ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
13 years 11 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks