共 50 条
- [1] About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call [J]. INTERNATIONAL JOINT CONFERENCE 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS (CISIS 2022) 13TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATION (ICEUTE 2022), 2023, 532 : 75 - 85
- [2] KDM Security for the Fujisaki-Okamoto Transformations in the QROM [J]. PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 286 - 315
- [3] QCCA Security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model [J]. PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 239 - 259
- [4] On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 99 - 129
- [6] Post-quantum Security of Plain OAEP Transform [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 34 - 51
- [7] A Modular Analysis of the Fujisaki-Okamoto Transformation [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 341 - 371
- [9] On the Complete Non-malleability of the Fujisaki-Okamoto Transform [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 307 - 335
- [10] Applying Fujisaki-Okamoto to identity-based encryption [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2006, 3857 : 183 - 192