Cryptographic Agility and Its Relation to Circular Encryption
- 1 January 2010
- book chapter
- Published by Springer Nature
- Vol. 2010, 403-422
- https://doi.org/10.1007/978-3-642-13190-5_21
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksPublished by Springer Nature ,2009
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning ProblemsPublished by Springer Nature ,2009
- Key-dependent message security under active attacks – BRSIM/UC-soundness of Dolev–Yao-style encryption with key cyclesJournal of Computer Security, 2008
- Circular-Secure Encryption from Decision Diffie-HellmanPublished by Springer Nature ,2008
- OAEP Is Secure under Key-Dependent MessagesPublished by Springer Nature ,2008
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing ProofsPublished by Springer Nature ,2006
- The EAX Mode of OperationPublished by Springer Nature ,2004
- Encryption-Scheme Security in the Presence of Key-Dependent MessagesPublished by Springer Nature ,2003
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity RevocationPublished by Springer Nature ,2001
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmPublished by Springer Nature ,2000