Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
126 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions |
112 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Secure Hashed Diffie-Hellman over Non-DDH Groups. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems |
64 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
55 | Ratna Dutta, Rana Barua |
Constant Round Dynamic Group Key Agreement. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
DDH problem, provable security, group key agreement |
44 | Allison B. Lewko, Brent Waters |
Efficient pseudorandom functions from the decisional linear assumption and weaker variants. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
decisional linear assumption, pseudorandom functions |
44 | Adam L. Young, Moti Yung |
Relationships Between Diffie-Hellman and "Index Oracles". |
SCN |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log |
44 | Yevgeniy Dodis |
Efficient Construction of (Distributed) Verifiable Random Functions. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Kaoru Kurosawa, Ryo Nojima |
Simple Adaptive Oblivious Transfer without Random Oracle. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Adaptive OT, Fully Simulatable, DDH, Standard Model |
41 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
40 | HongDa Li 0001, Bao Li 0001 |
Existence of 3-round zero-knowledge proof systems for NP. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
non-black-box simulation, DDH assumption, zero-knowledge proof, interactive proof |
40 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
40 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
40 | Junghyun Nam, Seungjoo Kim, Dongho Won |
Secure Group Communications over Combined Wired and Wireless Networks. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
combined wired and wireless networks, DDH assumption, mobile devices, Group key agreement |
38 | Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu 0001 |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Alexander W. Dent, Steven D. Galbraith |
Hidden Pairings and Trapdoor DDH Groups. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
29 | Ali Bagherzandi, Stanislaw Jarecki |
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Tengjiao Wang 0003, Bishan Yang, Jun Gao 0003, Dongqing Yang |
Effective Data Distribution and Reallocation Strategies for Fast Query Response in Distributed Query-Intensive Data Environments. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
data reallocation, query response, data distribution |
29 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague |
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. |
FoSSaCS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Matthieu Gaud, Jacques Traoré |
On the Anonymity of Fair Offline E-cash Systems. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Daniele Micciancio, Erez Petrank |
Simulatable Commitments and Efficient Concurrent Zero-Knowledge. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Ran Canetti, Shafi Goldwasser |
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Dan Boneh |
The Decision Diffie-Hellman Problem. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Han Jiang 0001, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang |
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. |
J. Ambient Intell. Humaniz. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto |
Rate-1 Fully Local Somewhere Extractable Hashing from DDH. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
23 | Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto |
Rate-1 Fully Local Somewhere Extractable Hashing from DDH. |
Public Key Cryptography (3) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu |
Twinkle: Threshold Signatures from DDH with Full Adaptive Security. |
EUROCRYPT (1) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Sourav Das, Ling Ren 0001 |
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
23 | Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu |
Twinkle: Threshold Signatures from DDH with Full Adaptive Security. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
23 | Arthur Lazzaretti, Charalampos Papamanthou |
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
23 | Théophile Brézot, Paola de Perthuis, David Pointcheval |
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
23 | Peihan Miao 0001, Sikhar Patranabis, Gaven J. Watson |
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH. |
Public Key Cryptography (2) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Zicheng Zhang, Yingjie Zhou, Wei Sun 0029, Wei Lu 0021, Xiongkuo Min, Yu Wang, Guangtao Zhai |
DDH-QA: A Dynamic Digital Humans Quality Assessment Database. |
ICME |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Théophile Brézot, Paola de Perthuis, David Pointcheval |
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. |
ESORICS (1) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Arthur Lazzaretti, Charalampos Papamanthou |
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH. |
CRYPTO (2) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang |
Correlation Intractability and SNARGs from Sub-exponential DDH. |
CRYPTO (4) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments based on the DDH Assumption. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Hui Wang 0040, Yang Jin, Hongchang Ke, Xinping Zhang |
DDH-YOLOv5: improved YOLOv5 based on Double IoU-aware Decoupled Head for object detection. |
J. Real Time Image Process. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Zicheng Zhang, Yingjie Zhou, Wei Sun 0029, Wei Lu 0021, Xiongkuo Min, Yu Wang, Guangtao Zhai |
DDH-QA: A Dynamic Digital Humans Quality Assessment Database. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Dario Catalano, Dario Fiore 0001, Emanuele Giunta |
Adaptively Secure Single Secret Leader Election from DDH. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan |
SNARGs for P from Sub-exponential DDH and QR. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | Peihan Miao 0001, Sikhar Patranabis, Gaven J. Watson |
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang |
Correlation Intractability and SNARGs from Sub-exponential DDH. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | Takuya Tsuruta, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki |
A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud. |
ICCE-TW |
2022 |
DBLP DOI BibTeX RDF |
|
23 | James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan |
SNARGs for P from Sub-exponential DDH and QR. |
EUROCRYPT (2) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Dario Catalano, Dario Fiore 0001, Emanuele Giunta |
Adaptively Secure Single Secret Leader Election from DDH. |
PODC |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Olivier Blazy, Saqib A. Kakvi |
Identity-Based Encryption in DDH Hard Groups. |
AFRICACRYPT |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Masayuki Fukumitsu, Shingo Hasegawa |
A Tightly Secure DDH-based Multisignature with Public-Key Aggregation. |
Int. J. Netw. Comput. |
2021 |
DBLP BibTeX RDF |
|
23 | Abhishek Jain 0002, Zhengzhong Jin |
Non-Interactive Zero Knowledge from Sub-exponential DDH. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
23 | Abhishek Jain 0002, Zhengzhong Jin |
Non-interactive Zero Knowledge from Sub-exponential DDH. |
EUROCRYPT (1) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Fazail Amin, Arijit Mondal, Jimson Mathew |
WLAMr-DDH: Weighted Laterals With Augmentation Mask for Discriminative Deep Hashing for Face Image Retrieval. |
IJCNN |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Saikrishna Badrinarayanan, James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee |
Reusable Two-Round MPC from DDH. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
23 | Péter Kutas, Christophe Petit 0001, Javier Silva 0001 |
Trapdoor DDH Groups from Pairings and Isogenies. |
SAC |
2020 |
DBLP DOI BibTeX RDF |
|
23 | James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee |
Reusable Two-Round MPC from DDH. |
TCC (2) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Masayuki Fukumitsu, Shingo Hasegawa |
A Tightly Secure DDH-based Multisignature with Public-Key Aggregation. |
CANDAR (Workshops) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Seok-min Hwang, Hee-Jun Park, Jong-Ha Lee |
A Study on a Mask R-CNN-Based Diagnostic System Measuring DDH Angles on Ultrasound Scans. |
IHCI (2) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Arunkumar Kannan, Antony J. Hodgson, Kishore Mulpuri, Rafeef Garbi |
Uncertainty Estimation for Assessment of 3D US Scan Adequacy and DDH Metric Reliability. |
UNSURE/GRAIL@MICCAI |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Péter Kutas, Christophe Petit 0001, Javier Silva 0001 |
Trapdoor DDH groups from pairings and isogenies. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
23 | Duc-Phong Le, Guomin Yang, Ali A. Ghorbani 0001 |
DDH-based Multisignatures with Public Key Aggregation. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
23 | Shuichi Katsumata, Shota Yamada 0001 |
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
23 | Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka |
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
23 | Keitaro Hashimoto, Wakaha Ogata, Toi Tomita |
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
23 | Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka |
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. |
ASIACRYPT (3) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Shuichi Katsumata, Shota Yamada 0001 |
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. |
Public Key Cryptography (2) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Kresimir Nenadic, Tomislav Galba, Irena Galic |
Image processing in differential digital holography (DDH). |
Int. Arab J. Inf. Technol. |
2018 |
DBLP BibTeX RDF |
|
23 | Tibor Jager, Rafael Kurek, Jiaxin Pan |
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
23 | Tibor Jager, Rafael Kurek, Jiaxin Pan |
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. |
ASIACRYPT (3) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Benoît Libert, Thomas Peters, Chen Qian 0002 |
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption. |
ESORICS (2) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Akshayaram Srinivasan, Chandrasekaran Pandu Rangan |
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. |
ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Huijia Lin, Vinod Vaikuntanathan |
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
23 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments based on the DDH Assumption. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
23 | Elette Boyle, Niv Gilboa, Yuval Ishai |
Breaking the Circuit Size Barrier for Secure Computation Under DDH. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
23 | Huijia Lin |
Indistinguishability Obfuscation from DDH on 5-linear Maps and Locality-5 PRGs. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
23 | Abhilash Rakkunedeth Hareendranathan, Myles Mabee, Kumaradevan Punithakumar, Michelle Noga, Jacob L. Jaremko |
Toward automated classification of acetabular shape in ultrasound for diagnosis of DDH: Contour alpha angle and the rounding index. |
Comput. Methods Programs Biomed. |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Huijia Lin, Vinod Vaikuntanathan |
Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings. |
FOCS |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Abhilash Rakkunedeth Hareendranathan, Dornoosh Zonoobi, Myles Mabee, Chad Diederichs, Kumaradevan Punithakumar, Michelle Noga, Jacob L. Jaremko |
Hip segmentation from MRI volumes in infants for DDH diagnosis and treatment planning. |
EMBC |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Muhammad Salman, Muhammad Asif Aziz, Munam Ali Shah |
Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks. |
ICAC |
2016 |
DBLP DOI BibTeX RDF |
|
23 | David Golan, Yoni Donner, Chris Mansi, Jacob L. Jaremko, Manoj Ramachandran |
Fully Automating Graf's Method for DDH Diagnosis Using Deep Convolutional Neural Networks. |
LABELS/DLMIA@MICCAI |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments Based on the DDH Assumption. |
SCN |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Elette Boyle, Niv Gilboa, Yuval Ishai |
Breaking the Circuit Size Barrier for Secure Computation Under DDH. |
CRYPTO (1) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 0001 |
Short Accountable Ring Signatures Based on DDH. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
23 | Guilhem Castagnos, Fabien Laguillaumie |
Linearly Homomorphic Encryption from DDH. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
23 | Akshayaram Srinivasan, C. Pandu Rangan |
Efficiently Obfuscating Re-Encryption Program under DDH Assumption. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
23 | Areen K. Al-Bashir, Mohammad A. Al-Abed, Fayez M. Abu Sharkh, Mohamed N. Kordeya, Fadi M. Al-Rousan |
Algorithm for automatic angles measurement and screening for Developmental Dysplasia of the Hip (DDH). |
EMBC |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Guilhem Castagnos, Fabien Laguillaumie |
Linearly Homomorphic Encryption from $$\mathsf {DDH}$$. |
CT-RSA |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 0001 |
Short Accountable Ring Signatures Based on DDH. |
ESORICS (1) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Yannick Seurin |
New Constructions and Applications of Trapdoor DDH Groups. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
23 | Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen |
Efficient leakage-resilient public key encryption from DDH assumption. |
Clust. Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Yannick Seurin |
New Constructions and Applications of Trapdoor DDH Groups. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Dingding Jia, Xianhui Lu, Bao Li 0001, Qixiang Mei |
RKA Secure PKE Based on the DDH and HR Assumptions. |
ProvSec |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis |
How powerful are the DDH hard groups? |
Electron. Colloquium Comput. Complex. |
2012 |
DBLP BibTeX RDF |
|
23 | Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis |
How powerful are the DDH hard groups? |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
23 | Shengli Liu 0001, Fangguo Zhang, Kefei Chen |
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Brett Hemenway, Rafail Ostrovsky |
Extended-DDH and Lossy Trapdoor Functions. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel |
DDH-Like Assumptions Based on Extension Rings. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
23 | |
DDH Problem. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Xiaodong Lin 0001 |
A provably secure threshold signature scheme based on DDH assumption. |
Secur. Commun. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Yehuda Lindell |
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|