Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
48
views
18
references
Top references
cited by
25
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,743
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2009
Hedged Public-Key Encryption: How to Protect against Bad Randomness
other
Author(s):
Mihir Bellare
,
Zvika Brakerski
,
Moni Naor
,
Thomas Ristenpart
,
Gil Segev
,
Hovav Shacham
,
Scott Yilek
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Privacy and Data Protection
Most cited references
18
Record
: found
Abstract
: not found
Book Chapter
: not found
Optimal asymmetric encryption
Mihir Bellare
,
Phillip Rogaway
(1995)
0
comments
Cited
114
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Deterministic and Efficiently Searchable Encryption
Mihir Bellare
,
Alexandra Boldyreva
,
Adam J. O’neill
(2007)
0
comments
Cited
62
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
Mihir Bellare
,
Alexandra Boldyreva
,
Silvio Micali
(2000)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 232-249
DOI:
10.1007/978-3-642-10366-7_14
SO-VID:
3d5e52e6-be4b-4a26-8cbc-d2c9e878eb52
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Related-Key Cryptanalysis of the Full AES-192 and AES-256
pp. 542
Improved Cryptanalysis of Skein
pp. 37
Cascade Encryption Revisited
pp. 126
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
pp. 179
Group Encryption: Non-interactive Realization in the Standard Model
pp. 232
Hedged Public-Key Encryption: How to Protect against Bad Randomness
pp. 319
Proofs of Storage from Homomorphic Identification Protocols
pp. 334
Simple Adaptive Oblivious Transfer without Random Oracle
pp. 505
Security Notions and Generic Constructions for Client Puzzles
pp. 524
Foundations of Non-malleable Hash and One-Way Functions
pp. 617
Efficient Public Key Encryption Based on Ideal Lattices
pp. 636
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
pp. 685
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
pp. 703
Signature Schemes with Bounded Leakage Resilience
Similar content
3,743
Analysis of insurance entrepreneurship as a hedge in times of crisis: a literature review
Authors:
Haitham Nobanee
,
Mohammed El Hadi El Maknouzi
,
Hicham Sadok
…
A bet-hedging strategy rather than just a classic fast life-history strategy exhibited by invasive fall armyworm
Authors:
Pengxiang Wu
,
Qilin Ren
,
Wei Wang
…
Nash Equilibria for Game Contingent Claims with Utility-Based Hedging
Authors:
Klebert Kentia
,
Christoph Kuhn
See all similar
Cited by
25
Message-Locked Encryption and Secure Deduplication
Authors:
Mihir Bellare
,
Sriram Keelveedhi
,
Thomas Ristenpart
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Authors:
Mihir Bellare
,
Zvika Brakerski
,
Moni Naor
…
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
Authors:
David Freeman
,
Oded Goldreich
,
Eike Kiltz
…
See all cited by