Adaptive chosen-ciphertext attack

Results: 68



#Item
11Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45
12Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Zero-knowledge proof / ElGamal encryption / Symmetric-key algorithm / RSA / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext indistinguishability

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
13One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
14McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
15Public-key cryptography / Internet protocols / Electronic commerce / Adaptive chosen-ciphertext attack / Transport Layer Security / Daniel Bleichenbacher / RSA / Padding / HTTP Secure / Cryptography / Secure communication / Cryptographic protocols

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Christopher Meyer, Juraj Somorovsky, Eugen Weiss, and Jörg Schwenk, Ruhr-University Bochum; Sebastian Schinzel, Münster University of App

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-10 20:13:35
16Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
17RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Cipher / Advantage / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:52:37
18RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:10
19Ciphertext / RSA / ElGamal encryption / Boneh/Franklin scheme / Public-key cryptography / Adaptive chosen-ciphertext attack / Chosen-plaintext attack / Cipher / Chosen-ciphertext attack / Cryptography / Proxy re-encryption / ID-based encryption

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
20Block cipher modes of operation / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Block cipher / Symmetric-key algorithm / RSA / Stream ciphers / Ciphertext stealing / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE