Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
92
views
22
references
Top references
cited by
43
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,771
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2011
Random Oracles in a Quantum World
other
Author(s):
Dan Boneh
,
Özgür Dagdelen
,
Marc Fischlin
,
Anja Lehmann
,
Christian Schaffner
,
Mark Zhandry
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Environmental, Social, and Governance
Most cited references
22
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Universally composable security: a new paradigm for cryptographic protocols
R. Canetti
(2025)
0
comments
Cited
235
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
The random oracle methodology, revisited (preliminary version)
Ran Canetti
,
Oded Goldreich
,
Shai Halevi
(1998)
0
comments
Cited
74
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 41-69
DOI:
10.1007/978-3-642-25385-0_3
SO-VID:
f6be7579-70e6-4a19-8c61-8d22f085135b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
BKZ 2.0: Better Lattice Security Estimates
pp. 288
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
pp. 21
Functional Encryption for Inner Product Predicates from Learning with Errors
pp. 486
Cryptography Secure against Related-Key Attacks and Tampering
pp. 41
Random Oracles in a Quantum World
pp. 70
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
pp. 179
Polly Cracker, Revisited
pp. 327
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
pp. 372
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
pp. 407
Two Provers in Isolation
pp. 702
Leakage-Resilient Cryptography from the Inner-Product Extractor
pp. 722
Program Obfuscation with Leaky Hardware
pp. 740
BiTR: Built-in Tamper Resilience
Similar content
3,771
Abstraction in Assertion-Based Test Oracles
Authors:
Yoonsik Cheon
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
Authors:
Antoine Joux
,
Reynald Lercier
,
David Naccache
…
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
Authors:
Steve Lu
,
Rafail Ostrovsky
,
Amit Sahai
…
See all similar
Cited by
42
Random Oracles in a Quantum World
Authors:
Dan Boneh
,
Özgür Dagdelen
,
Marc Fischlin
…
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Authors:
Dan Boneh
,
Mark Zhandry
Secure Identity-Based Encryption in the Quantum Random Oracle Model
Authors:
Mark Zhandry
See all cited by