Chosen-ciphertext attack

Results: 243



#Item
141McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
142Transport Layer Security / Chosen-plaintext attack / HTTP Secure / Ciphertext / Block cipher modes of operation / Authenticated encryption / Password / Probabilistic encryption / Known-plaintext attack / Cryptography / Security / Initialization vector

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
143Ciphertext indistinguishability / Voronoi diagram / Chosen-plaintext attack / Cryptography / Homomorphic encryption / RSA

Secure Nearest Neighbor Revisited Bin Yao1 , Feifei Li2 , Xiaokui Xiao3 1 Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2013-07-08 15:39:55
144Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]Dag Arne Osvik1 , Adi Shamir2 and Eran Tromer2 1

Add to Reading List

Source URL: www.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
145Secure communication / Cryptographic protocols / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Yale University Department of Computer Science Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs David Isaac Wolinsky

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-28 11:34:07
146Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
147Block cipher modes of operation / Ciphertext indistinguishability / Chosen-plaintext attack / Ciphertext / Malleability / Cryptography / Espionage / Cyberwarfare

First Modes of Operation Workshop (October[removed]New Modes of Encryption - A Perspective and a Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:23:40
148Plaintext-aware encryption / Malleability / Advantage / Block cipher modes of operation / Chosen-ciphertext attack / Ciphertext / Cryptography / Chosen-plaintext attack / Ciphertext indistinguishability

First Modes of Operation Workshop (October 2000): A Message Integrity in Symmetric Encryption Message-Int4.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:32:39
149Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
150Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
UPDATE