Sciweavers

285 search results - page 15 / 57
» Intrusion-Resilient Public-Key Encryption
Sort
View
CTRSA
2008
Springer
97views Cryptology» more  CTRSA 2008»
13 years 8 months ago
Public-Key Encryption with Non-interactive Opening
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, R...
TISSEC
2008
77views more  TISSEC 2008»
13 years 7 months ago
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
14 years 4 months ago
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Abstract. We propose a semantically-secure public-key encryption scheme whose security is polynomialtime equivalent to the hardness of solving random instances of the subset sum pr...
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
ASIACRYPT
2001
Springer
14 years 5 days ago
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching publi...
Arjen K. Lenstra