Chosen-ciphertext attack

Results: 243



#Item
31Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45
32CS 161  Computer Security Spring 2010

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
33Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
341234145467836391829836846489A2BCBD183  École doctorale nO 84 : Sciences et technologies de l’information et de la communication  Doctorat ParisTech

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
35Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
36Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
37Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
38Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
39Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH  December 30, 2014

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
40Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-07-27 09:04:16