共 50 条
- [31] On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3 2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 2804 - 2807
- [32] CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test COMPUTER JOURNAL, 2016, 59 (11): : 1689 - 1694
- [33] Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 168 - 185
- [34] TTS without revocation capability secure against CCA2 INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 36 - 49
- [36] A Mix-Net from Any CCA2 Secure Cryptosystem ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 607 - 625
- [37] CCA-Secure Leveled FHE From Multi-Identity Fully Homomorphic Encryption PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 512 - 516
- [38] Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024, 2024, 14652 : 63 - 93
- [39] Homomorphic Encryption COMPLEX ADAPTIVE SYSTEMS: EMERGING TECHNOLOGIES FOR EVOLVING SYSTEMS: SOCIO-TECHNICAL, CYBER AND BIG DATA, 2013, 20 : 502 - 509
- [40] Chosen ciphertext k-trace attacks on masked cca2 secure kyber IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (04): : 88 - 113