-
1
Analysis of Gong et al.'s CCA2-secure homomorphic encryption
Published 2017Subjects: Get full text
Get full text
Journal Article -
2
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
Published 2015-06-01Subjects: Get full text
Article -
3
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
Published 2022-10-01Subjects: Get full text
Article -
4
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives
Published 2016-11-01Subjects: Get full text
Article -
5
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks
Published 2023-01-01Subjects: Get full text
Article -
6
-
7
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
Published 2024-03-01Subjects: Get full text
Article -
8
A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage
Published 2022-01-01Subjects: Get full text
Article -
9
Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings
Published 2018-01-01Subjects: Get full text
Article -
10
Server-aided access control for cloud computing
Published 2016-10-01Subjects: Get full text
Article -
11
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond
Published 2023-03-01Subjects: Get full text
Article -
12
Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System
Published 2021-12-01Subjects: Get full text
Article -
13
-
14
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs
Published 2020-06-01Subjects: Get full text
Article -
15
A construction of encryption protocols over some semidirect products
Published 2023-03-01Subjects: “…indistinguishability against adaptive chosen ciphertext attack…”
Get full text
Article -
16
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
Published 2019-01-01Subjects: “…Adaptive chosen ciphertext attacks…”
Get full text
Article -
17
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Published 2022-08-01Subjects: Get full text
Article -
18
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Published 2022-08-01Subjects: Get full text
Article -
19
Cryptanalysis of Zhu et al.’s Identity-Based Encryption With Equality Test Without Random Oracles
Published 2023-01-01Subjects: “…Chosen ciphertext attacks…”
Get full text
Article -
20
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01Subjects: Get full text
Article