DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Random oracle

Random oracle

  • Modern Cryptography: Lecture 13 Digital Signatures

    Modern Cryptography: Lecture 13 Digital Signatures

  • A Provably-Unforgeable Threshold Eddsa with an Offline Recovery Party

    A Provably-Unforgeable Threshold Eddsa with an Offline Recovery Party

  • On Notions of Security for Deterministic Encryption, and Efficient Constructions Without Random Oracles

    On Notions of Security for Deterministic Encryption, and Efficient Constructions Without Random Oracles

  • Securing Threshold Cryptosystems Against Chosen Ciphertext Attack∗

    Securing Threshold Cryptosystems Against Chosen Ciphertext Attack∗

  • Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information

    Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information

  • Random Oracle Model, Hashing Applications

    Random Oracle Model, Hashing Applications

  • How Risky Is the Random-Oracle Model?

    How Risky Is the Random-Oracle Model?

  • Hash Functions Part II

    Hash Functions Part II

  • Random Oracles in a Quantum World

    Random Oracles in a Quantum World

  • Improved Bounds on Security Reductions for Discrete Log Based Signatures

    Improved Bounds on Security Reductions for Discrete Log Based Signatures

  • CRYPTREC Review of Eddsa CRYPTREC EX-3003-2020

    CRYPTREC Review of Eddsa CRYPTREC EX-3003-2020

  • Random Oracle Reducibility

    Random Oracle Reducibility

  • Hash Function Security : Cryptanalysis of the Very Smooth Hash

    Hash Function Security : Cryptanalysis of the Very Smooth Hash

  • A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack

    A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack

  • The Random Oracle Methodology, Revisited∗

    The Random Oracle Methodology, Revisited∗

  • A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants

    A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants

  • Hash Function Requirements for Schnorr Signatures

    Hash Function Requirements for Schnorr Signatures

  • Cryptanalysis of Dedicated Cryptographic Hash Functions

    Cryptanalysis of Dedicated Cryptographic Hash Functions

Top View
  • Taming the Many Eddsas
  • Applications of Paillier S Cryptosystem
  • Lecture 14 - CCA Security
  • Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
  • Secure Hash-And-Sign Signatures Without the Random Oracle
  • Cryptographic Hash Functions
  • Non-Interactive Half-Aggregation of Eddsa and Variants of Schnorr Signatures
  • Signature Schemes in the Quantum Random-Oracle Model
  • VSH, an Efficient and Provable Collision-Resistant Hash Function
  • Fast Cramer-Shoup Cryptosystem
  • On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
  • Random Oracles With(Out) Programmability*
  • Randomness-Dependent Message Security
  • The Cramer-Shoup Cryptosystem
  • Identity-Based Cryptography from Paillier Cryptosystem
  • Short Signatures Without Random Oracles
  • The Provable Security of Ed25519: Theory and Practice
  • An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem


© 2024 Docslib.org    Feedback