Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
Citations
3 citations
Cites methods from "Sponge Based CCA2 Secure Asymmetric..."
...The Sponge-based padding proposed in [8] is versatile and has been used in a different security model for asymmetric encryption based on an ideal permutation....
[...]
2 citations
2 citations
2 citations
1 citations
References
5,313 citations
"Sponge Based CCA2 Secure Asymmetric..." refers methods in this paper
...Therefore, for generating lengthy hash output, RSA-Full Domain Hash [16, 17, 18] or the Mask Generation Function (MGF1) [6] in RSA-OAEP are currently implemented with a complex construction of fixed length hashes and counters....
[...]
1,198 citations
"Sponge Based CCA2 Secure Asymmetric..." refers background in this paper
...The definition of security we have presented here is from [34]....
[...]
1,180 citations
1,079 citations
"Sponge Based CCA2 Secure Asymmetric..." refers methods in this paper
...Therefore, for generating lengthy hash output, RSA-Full Domain Hash [16, 17, 18] or the Mask Generation Function (MGF1) [6] in RSA-OAEP are currently implemented with a complex construction of fixed length hashes and counters....
[...]
1,057 citations