Author of the publication

Relations among notions of security for public-key encryption schemes

, , , and . Advances in Cryptology --- CRYPTO '98, page 26--45. Berlin, Heidelberg, Springer Berlin Heidelberg, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 503-516. Springer, (2000)The rationale behind interfirm tender offers : Information or synergy?, , and . Journal of Financial Economics, 11 (1-4): 183--206 (April 1983)New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack.. CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 394-412. Springer, (2000)A Concrete Security Treatment of Symmetric Encryption., , , and . FOCS, page 394-403. IEEE Computer Society, (1997)Synergistic gains from corporate acquisitions and their division between the stockholders of target and acquiring firms, , and . Journal of Financial Economics, 21 (1): 3--40 (May 1988)Key-Privacy in Public-Key Encryption., , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 566-582. Springer, (2001)Relations Among Notions of Security for Public-Key Encryption Schemes., , , and . CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 26-45. Springer, (1998)The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search.. CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 359-375. Springer, (2000)