Adaptive chosen-ciphertext attack

Results: 68



#Item
51Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
52Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack / Methicillin-resistant Staphylococcus aureus / Malleability / Digital signature / Semantic security / Chosen-ciphertext attack / ID-based encryption / PKCS / Cryptography / Public-key cryptography / RSA

Simple Identity-Based Cryptography with Mediated RSA ? Xuhua Ding and Gene Tsudik Department of Information and Computer Science, University of California, Irvine. Email: {xhding,gts}@ics.uci.edu

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2005-07-01 12:17:37
53Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / Malleability / Random oracle / Mihir Bellare / Semantic security / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
54Electronic commerce / Internet privacy / RSA / Email encryption / Adaptive chosen-ciphertext attack / S/MIME / Ciphertext / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Email authentication

Multiplex Encryption: A Practical Approach to Encrypting Multi-Recipient Emails Wei Wei1 , Xuhua Ding2 , and Kefei Chen1 1 2

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2006-02-19 04:00:35
55RSA / Chosen-ciphertext attack / PKCS / Optimal asymmetric encryption padding / Padding / Adaptive chosen-ciphertext attack / Daniel Bleichenbacher / Plaintext-aware encryption / Ciphertext / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
56Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
57Chosen-ciphertext attack / Padding / RSA / Advantage / Random oracle / Block cipher / Ciphertext / Cipher / Stream cipher / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

An OAEP Variant With a Tight Security Proof – Draft 1.0 Jakob Jonsson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-03-18 14:07:36
58Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / IEEE P1363 / RSA / Key encapsulation / Integrated Encryption Scheme / Chosen-ciphertext attack / Block cipher modes of operation / Random oracle / Cryptography / Cryptography standards / Public-key cryptography

A Proposal for an ISO Standard for Public Key Encryption (version 2.1) Victor Shoup

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-12-20 09:19:49
59Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
60Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
UPDATE