Adaptive chosen-ciphertext attack

Results: 68



#Item
21McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
22Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
23Chosen-ciphertext attack / Pretty Good Privacy / Initialization vector / Encryption / Known-plaintext attack / Block cipher / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
24Chosen-ciphertext attack / ElGamal encryption / Advantage / Chosen-plaintext attack / Hybrid cryptosystem / Integrated Encryption Scheme / Ciphertext / Cipher / RSA / Cryptography / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
25Authenticated encryption / Semantic security / RSA / ElGamal encryption / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Signcryption / Ciphertext / Malleability / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
26Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
27Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
28Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
29Chosen-ciphertext attack / Malleability / Advantage / Cramer–Shoup cryptosystem / Steganography / Ciphertext / Adaptive chosen-ciphertext attack / Cryptosystem / Cipher / Cryptography / Ciphertext indistinguishability / Semantic security

Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-26 15:47:29
30Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
UPDATE