[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
[图书][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
[图书][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …
Optimal asymmetric encryption
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an
encryption scheme for which (i) any string x of length slightly less than k bits can be …
encryption scheme for which (i) any string x of length slightly less than k bits can be …
[PDF][PDF] Sequences of games: a tool for taming complexity in security proofs
V Shoup - cryptology eprint archive, 2004 - eprint.iacr.org
Sequences of Games: A Tool for Taming Complexity in Security Proofs Page 1 Sequences of
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …
Tightly-secure key-encapsulation mechanism in the quantum random oracle model
T Saito, K Xagawa, T Yamakawa - … on the Theory and Applications of …, 2018 - Springer
Key-encapsulation mechanisms secure against chosen ciphertext attacks (IND-CCA-secure
KEMs) in the quantum random oracle model have been proposed by Boneh, Dagdelen …
KEMs) in the quantum random oracle model have been proposed by Boneh, Dagdelen …
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of developing techniques that help tame the complexity of their proofs. Game-based …
in favor of developing techniques that help tame the complexity of their proofs. Game-based …
Post-quantum security of the Fujisaki-Okamoto and OAEP transforms
EE Targhi, D Unruh - … of Cryptography: 14th International Conference, TCC …, 2016 - Springer
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the
quantum random oracle model. Our scheme is a combination of an asymmetric and a …
quantum random oracle model. Our scheme is a combination of an asymmetric and a …
Dissent: accountable anonymous group messaging
H Corrigan-Gibbs, B Ford - Proceedings of the 17th ACM conference on …, 2010 - dl.acm.org
Users often wish to participate in online groups anonymously, but misbehaving users may
abuse this anonymity to disrupt the group's communication. Existing messaging protocols …
abuse this anonymity to disrupt the group's communication. Existing messaging protocols …
Code-based game-playing proofs and the security of triple encryption
The game-playing technique is a powerful tool for analyzing cryptographic constructions. We
illustrate this by using games as the central tool for proving security of three-key triple …
illustrate this by using games as the central tool for proving security of three-key triple …