Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2011

Highly Cited

2011

In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can… Expand

Is this relevant?

2009

2009

The paper ldquosecure arithmetic codingrdquo (in IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 2263-2272, May 2007… Expand

Is this relevant?

Highly Cited

2008

Highly Cited

2008

Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the long-standing open problem of "circular… Expand

Is this relevant?

Highly Cited

2003

Highly Cited

2003

We propose a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based… Expand

Is this relevant?

Highly Cited

2002

Highly Cited

2002

We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presence… Expand

Is this relevant?

Highly Cited

2001

Highly Cited

2001

We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen… Expand

Is this relevant?

Highly Cited

2000

Highly Cited

2000

We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally… Expand

Is this relevant?

Highly Cited

1999

Highly Cited

1999

This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack… Expand

Is this relevant?

Highly Cited

1998

Highly Cited

1998

A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive… Expand

Is this relevant?

Highly Cited

1998

Highly Cited

1998

This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA private… Expand

Is this relevant?