Optimal Asymmetric Encryption

  title={Optimal Asymmetric Encryption},
  author={Mihir Bellare and Phillip Rogaway},
Highly Influential
This paper has highly influenced 79 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 699 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 431 extracted citations

Public-Key Cryptography – PKC 2014

Lecture Notes in Computer Science • 2014
View 19 Excerpts
Highly Influenced

Theory and Application of Extractable Functions

Diego Silva, Ramzi Ronny Dakdouk
View 17 Excerpts
Highly Influenced

Imperfect Decryption and an Attack on the NTRU Encryption Scheme

IACR Cryptology ePrint Archive • 2003
View 16 Excerpts
Highly Influenced

Advances in Cryptology – EUROCRYPT 2018

Lecture Notes in Computer Science • 2018
View 10 Excerpts
Highly Influenced

Random Oracles and Non-Uniformity

IACR Cryptology ePrint Archive • 2017
View 6 Excerpts
Highly Influenced

Theory of Cryptography

Lecture Notes in Computer Science • 2016
View 11 Excerpts
Highly Influenced

699 Citations

Citations per Year
Semantic Scholar estimates that this publication has 699 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…