共 50 条
- [31] Efficient CCA-secure public-key encryption schemes from RSA-related assumptions PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 176 - +
- [33] Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 275 - 305
- [34] CCA-Secure Public Key Encryption without Group-Dependent Hash Functions IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 967 - 970
- [35] Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 467 - 484
- [37] Strongly secure authenticated key exchange from factoring, codes, and lattices Designs, Codes and Cryptography, 2015, 76 : 469 - 504
- [38] Efficient CCA-Secure PKE from Identity-Based Techniques TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
- [39] Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 172 - 196
- [40] Secure authenticated key exchange for WSNs in IoT applications JOURNAL OF SUPERCOMPUTING, 2021, 77 (12): : 13897 - 13910