Cited By
View all- Li JWang LZhang ZNiu XChen XWang XHuang X(2016)Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilyProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897920(895-900)Online publication date: 30-May-2016
- Barthe GCrespo JGrégoire BKunz CLakhnech YSchmidt BZanella-Béguelin SSadeghi AGligor VYung M(2013)Fully automated analysis of padding-based encryption in the computational modelProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516663(1247-1260)Online publication date: 4-Nov-2013
- Coretti SMaurer UTackmann B(2013)Constructing Confidential Channels from Authenticated Channels--Public-Key Encryption RevisitedPart I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 826910.1007/978-3-642-42033-7_8(134-153)Online publication date: 1-Dec-2013
- Show More Cited By