Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
51
views
18
references
Top references
cited by
25
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,020
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2009
Hedged Public-Key Encryption: How to Protect against Bad Randomness
other
Author(s):
Mihir Bellare
,
Zvika Brakerski
,
Moni Naor
,
Thomas Ristenpart
,
Gil Segev
,
Hovav Shacham
,
Scott Yilek
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Privacy and Data Protection
Most cited references
18
Record
: found
Abstract
: not found
Book Chapter
: not found
Optimal asymmetric encryption
Mihir Bellare
,
Phillip Rogaway
(1995)
0
comments
Cited
114
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Deterministic and Efficiently Searchable Encryption
Mihir Bellare
,
Alexandra Boldyreva
,
Adam J. O’neill
(2007)
0
comments
Cited
62
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
Mihir Bellare
,
Alexandra Boldyreva
,
Silvio Micali
(2000)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 232-249
DOI:
10.1007/978-3-642-10366-7_14
SO-VID:
3d5e52e6-be4b-4a26-8cbc-d2c9e878eb52
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Related-Key Cryptanalysis of the Full AES-192 and AES-256
pp. 542
Improved Cryptanalysis of Skein
pp. 37
Cascade Encryption Revisited
pp. 126
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
pp. 179
Group Encryption: Non-interactive Realization in the Standard Model
pp. 232
Hedged Public-Key Encryption: How to Protect against Bad Randomness
pp. 319
Proofs of Storage from Homomorphic Identification Protocols
pp. 334
Simple Adaptive Oblivious Transfer without Random Oracle
pp. 505
Security Notions and Generic Constructions for Client Puzzles
pp. 524
Foundations of Non-malleable Hash and One-Way Functions
pp. 617
Efficient Public Key Encryption Based on Ideal Lattices
pp. 636
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
pp. 685
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
pp. 703
Signature Schemes with Bounded Leakage Resilience
Similar content
3,020
Jet fuel hedging, operational fuel efficiency improvement and carbon tax
Authors:
Yi-bin Xiao
,
Rong Hu
,
Changmin Jiang
New polyacetylenes from Echinophora cinerea (Boiss.) Hedge et Lamond
Authors:
Z Jelodarian
,
Y SHOKOOHINIA
,
M RASHIDI
…
Frank-Wolfe Progressive Hedging Algorithm for Improved Lower Bound in Stochastic SCUC
Authors:
Ananth M. Palani
,
Hongyu Wu
,
Medhat M. Morcos
See all similar
Cited by
25
Message-Locked Encryption and Secure Deduplication
Authors:
Mihir Bellare
,
Sriram Keelveedhi
,
Thomas Ristenpart
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Authors:
Mihir Bellare
,
Zvika Brakerski
,
Moni Naor
…
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
Authors:
David Freeman
,
Oded Goldreich
,
Eike Kiltz
…
See all cited by