Chosen-ciphertext attack

Results: 243



#Item
21Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:45
22

Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Sumit Kumar Pandey, Santanu Sarkar and Mahavir Prasad Jhanwar CR Rao AIMSCS Hyderabad

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    23Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

    Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-03-17 15:01:03
    24Cryptography / Onion routing / Chosen-ciphertext attack / Public-key cryptography / Transmission Control Protocol / Mix network / RSA / Encryption / Mixminion

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2008-05-30 10:39:07
    25Cryptography / Public-key cryptography / Ciphertext indistinguishability / Cryptographic protocols / Cryptographic software / Chosen-ciphertext attack / RSA / Key exchange / Advantage / CryptoVerif / Semantic security / Strong secrecy

    PDF Document

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-16 06:52:57
    26Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

    Add to Reading List

    Source URL: www.dtc.umn.edu

    Language: English - Date: 1999-02-17 16:51:49
    27

    Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2001-12-17 07:56:45
      28Ciphertext / Stream cipher / Advantage / Cryptanalysis / Cipher / Chosen-plaintext attack / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher / Feistel cipher

      Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-02-04 12:37:29
      29Advantage / Chosen-ciphertext attack / Initialization vector / Chosen-plaintext attack / Ciphertext / One-time pad / RSA / Cipher / Plaintext-aware encryption / Cryptography / Semantic security / Ciphertext indistinguishability

      U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

      Add to Reading List

      Source URL: www.cs.berkeley.edu

      Language: English - Date: 2015-01-21 19:48:43
      UPDATE