Chosen-ciphertext attack

Results: 243



#Item
21Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:45
22Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Sumit Kumar Pandey, Santanu Sarkar and Mahavir Prasad Jhanwar CR Rao AIMSCS Hyderabad

Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Sumit Kumar Pandey, Santanu Sarkar and Mahavir Prasad Jhanwar CR Rao AIMSCS Hyderabad

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    23Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-03-17 15:01:03
    24

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2008-05-30 10:39:07
    25

    PDF Document

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-16 06:52:57
    26A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

    Add to Reading List

    Source URL: www.dtc.umn.edu

    Language: English - Date: 1999-02-17 16:51:49
    27Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

    Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2001-12-17 07:56:45
      28Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

      Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-02-04 12:37:29
      29U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

      U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

      Add to Reading List

      Source URL: www.cs.berkeley.edu

      Language: English - Date: 2015-01-21 19:48:43