Author of the publication

Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems.

, , and . IACR Cryptology ePrint Archive, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial Runtime in Simulatability Definitions., , and . CSFW, page 156-169. IEEE Computer Society, (2005)The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure., , and . IACR Cryptology ePrint Archive, (2006)RKA-KDM secure encryption from public-key encryption., , and . IACR Cryptology ePrint Archive, (2013)Circular chosen-ciphertext security with compact ciphertexts.. IACR Cryptology ePrint Archive, (2012)Confined Guessing: New Signatures From Standard Assumptions., , , , and . IACR Cryptology ePrint Archive, (2013)A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security., , and . IACR Cryptology ePrint Archive, (2006)The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO., , and . IACR Cryptology ePrint Archive, (2018)On Tightly Secure Non-Interactive Key Exchange., , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 65-94. Springer, (2018)Reconfigurable Cryptography: A Flexible Approach to Long-Term Security., , and . TCC (A1), volume 9562 of Lecture Notes in Computer Science, page 416-445. Springer, (2016)Bounded CCA2-Secure Encryption., , , , , , , and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 502-518. Springer, (2007)