An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
Citations
320 citations
93 citations
Cites background from "An efficient IND-CCA2 secure varian..."
...Classical CCA2-secure conversions work in the random oracle model [22, 28], while the problem of finding efficient CCA2-secure conversions of these cryptosystem in the standard model has been addressed more recently [19, 18, 39, 42, 44]....
[...]
44 citations
35 citations
Additional excerpts
...As for IND-CCA2 security, a few promising recent results have been published, for instance by Preetha Mathew, Vasant, Venkatesan and Pandu Rangan [78] at ACISP 2012....
[...]
14 citations
References
1,220 citations
"An efficient IND-CCA2 secure varian..." refers background in this paper
...The important notions in public key cryptography are that of security under chosen ciphertext attack (CCA security) and trapdoor functions (TDFs) [7,17,20]....
[...]
1,198 citations
"An efficient IND-CCA2 secure varian..." refers background in this paper
...The important notions in public key cryptography are that of security under chosen ciphertext attack (CCA security) and trapdoor functions (TDFs) [7,17,20]....
[...]
1,007 citations
1,000 citations