Chosen-ciphertext attack

Results: 243



#Item
201Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
202Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
203Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
204Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
205RSA / Strong RSA assumption / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Cipher / Plaintext-aware encryption / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / RSA problem

RSA Problem Ronald L. Rivest, MIT Laboratory for Computer Science [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2003-12-18 14:24:00
206Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
207Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
208Ciphertext / One-time pad / Chosen-plaintext attack / Gilbert Vernam / Cryptanalysis / Cipher / Vigenère cipher / Ciphertext stealing / Cryptography / Stream ciphers / Keystream

A Genetic Algorithm for Ciphertext-Only Attack in Cryptanalysis

Add to Reading List

Source URL: csis.bits-pilani.ac.in

Language: English - Date: 2008-05-21 02:03:20
209Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
210Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
UPDATE