Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
30
views
17
references
Top references
cited by
24
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,986
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT'98
Securing threshold cryptosystems against chosen ciphertext attack
other
Author(s):
Victor Shoup
,
Rosario Gennaro
Publication date
(Online):
May 25 2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
17
Record
: found
Abstract
: not found
Book Chapter
: not found
Lower Bounds for Discrete Logarithms and Related Problems
Victor Shoup
(1997)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Optimal asymmetric encryption
Mihir Bellare
,
Phillip Rogaway
(1995)
0
comments
Cited
114
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Public-key cryptosystems provably secure against chosen ciphertext attacks
M. Yung
,
M Naor
(1990)
0
comments
Cited
103
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1998
Publication date (Online):
May 25 2006
Pages
: 1-16
DOI:
10.1007/BFb0054113
SO-VID:
3be42201-d9be-4cae-8497-bccab7199f1a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Securing threshold cryptosystems against chosen ciphertext attack
pp. 294
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption
pp. 32
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
pp. 59
Breaking RSA may not be equivalent to factoring
pp. 72
Lower bounds on generic algorithms in groups
pp. 145
Optimum traitor tracing and asymmetric schemes
pp. 158
On finding small solutions of modular multivariate polynomial equations
pp. 221
Speeding up discrete log and factoring based schemes via precomputations
pp. 236
Fast batch verification for modular exponentiation and digital signatures
pp. 266
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible
pp. 334
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
pp. 361
On the foundations of oblivious transfer
pp. 391
Strengthened security for blind signatures
pp. 406
Generic constructions for secure and efficient confirmer signature schemes
pp. 422
Security analysis of a practical “on the fly” authentication and signature generation
pp. 437
Universally verifiable mix-net with verification work independent of the number of mix-servers
pp. 448
A practical mix
pp. 475
Highly nonlinear balanced Boolean functions with a good correlation-immunity
pp. 489
Heuristic design of cryptographically strong balanced Boolean functions
pp. 512
Combinatorial bounds for broadcast encryption
pp. 561
Easy come — Easy go divisible cash
pp. 591
Optimistic fair exchange of digital signatures
Similar content
2,986
An overview of alternate therapies chosen by patients with cancer.
Authors:
P M Montbriand
Radiological Imaging of Gastro-Entero-Pancreatic Neuroendocrine Tumors. The Review of Current Literature Emphasizing the Diagnostic Value of Chosen Imaging Methods
Authors:
Gabriela Półtorak-Szymczak
,
Tadeusz Budlewski
,
Mariusz Ireneusz Furmanek
…
Effects of chosen versus assigned jobs on the work performance of persons with severe handicaps.
Authors:
J. Reynolds
,
M Bumgarner
,
M B Parsons
…
See all similar
Cited by
23
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Authors:
Jan Camenisch
,
Victor Shoup
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Authors:
Rosario Gennaro
,
Stanisław Jarecki
,
Hugo Krawczyk
…
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
Authors:
Tatsuaki Okamoto
,
David Pointcheval
See all cited by