Secure Integration of Asymmetric and Symmetric Encryption Schemes
- 16 December 1999
- book chapter
- Published by Springer Nature
- p. 537-554
- https://doi.org/10.1007/3-540-48405-1_34
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacksPublished by Springer Nature ,2001
- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext AttackPublished by Springer Nature ,2001
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial InformationPublished by Springer Nature ,2000
- A new public-key cryptosystem as secure as factoringPublished by Springer Nature ,1998
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackPublished by Springer Nature ,1998
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- Public-key cryptosystems provably secure against chosen ciphertext attacksPublished by Association for Computing Machinery (ACM) ,1990
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978