Using Hash Functions as a Hedge against Chosen Ciphertext Attack
- 12 May 2000
- book chapter
- Published by Springer Nature
- p. 275-288
- https://doi.org/10.1007/3-540-45539-6_19
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Secure Integration of Asymmetric and Symmetric Encryption SchemesPublished by Springer Nature ,1999
- Signature schemes based on the strong RSA assumptionPublished by Association for Computing Machinery (ACM) ,1999
- The Decision Diffie-Hellman problemPublished by Springer Nature ,1998
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackPublished by Springer Nature ,1998
- Collision-Resistant hashing: Towards making UOWHFs practicalPublished by Springer Nature ,1997
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- How to recycle random bitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- New directions in cryptographyIEEE Transactions on Information Theory, 1976