[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

Optimal asymmetric encryption

M Bellare, P Rogaway - … in Cryptology—EUROCRYPT'94: Workshop on …, 1995 - Springer
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an
encryption scheme for which (i) any string x of length slightly less than k bits can be …

[PDF][PDF] Sequences of games: a tool for taming complexity in security proofs

V Shoup - cryptology eprint archive, 2004 - eprint.iacr.org
Sequences of Games: A Tool for Taming Complexity in Security Proofs Page 1 Sequences of
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …

Tightly-secure key-encapsulation mechanism in the quantum random oracle model

T Saito, K Xagawa, T Yamakawa - … on the Theory and Applications of …, 2018 - Springer
Key-encapsulation mechanisms secure against chosen ciphertext attacks (IND-CCA-secure
KEMs) in the quantum random oracle model have been proposed by Boneh, Dagdelen …

Formal certification of code-based cryptographic proofs

G Barthe, B Grégoire, S Zanella Béguelin - Proceedings of the 36th …, 2009 - dl.acm.org
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of developing techniques that help tame the complexity of their proofs. Game-based …

Post-quantum security of the Fujisaki-Okamoto and OAEP transforms

EE Targhi, D Unruh - … of Cryptography: 14th International Conference, TCC …, 2016 - Springer
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the
quantum random oracle model. Our scheme is a combination of an asymmetric and a …

Dissent: accountable anonymous group messaging

H Corrigan-Gibbs, B Ford - Proceedings of the 17th ACM conference on …, 2010 - dl.acm.org
Users often wish to participate in online groups anonymously, but misbehaving users may
abuse this anonymity to disrupt the group's communication. Existing messaging protocols …

Code-based game-playing proofs and the security of triple encryption

M Bellare, P Rogaway - Cryptology ePrint Archive, 2004 - eprint.iacr.org
The game-playing technique is a powerful tool for analyzing cryptographic constructions. We
illustrate this by using games as the central tool for proving security of three-key triple …