Chosen-ciphertext attack

Results: 243



#Item
161Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

2011 IEEE Symposium on Security and Privacy Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Juliano Rizzo Netifera

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2011-04-20 04:03:50
162Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
163Ciphertext / Cipher / RSA / Encryption / Key / Proxy re-encryption / Cryptography / ID-based encryption / Chosen-ciphertext attack

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 23:47:37
164Advantage / Ciphertext / Cipher / RSA / Key / Public-key cryptography / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / ID-based encryption

Achieving Leakage Resilience Through Dual System Encryption Allison Lewko ∗ University of Texas at Austin [removed] Yannis Rouselakis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-26 03:11:13
165Cipher / RSA / Public-key cryptography / Chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Encryption / ID-based encryption

Copyright by Allison Bishop Lewko 2012 The Dissertation Committee for Allison Bishop Lewko

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-07-16 23:33:58
166RSA / Boneh/Franklin scheme / Cipher / Advantage / Chosen-ciphertext attack / Cryptography / ID-based encryption / Ciphertext

New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-29 23:19:39
167Cipher / Public-key cryptography / Key / ID-based encryption / Chosen-ciphertext attack / Cryptography / RSA / Ciphertext

Decentralizing Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed] Allison Lewko ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-04 16:35:50
168Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
169Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

JOUX - Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:12:38
170ICE / Ciphertext / Linear feedback shift register / Chosen-plaintext attack / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / Stream cipher

Cryptanalysis of Hummingbird-1 Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
UPDATE