Chosen-ciphertext attack

Results: 243



#Item
51Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-04 04:34:32
52An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:10
53Ciphertext-Policy Attribute-Based Encryption

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
54Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese  Information Security Institute

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
55Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley   Abstract

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
56A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
57Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH  December 30, 2014

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
58Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
59Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
60Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30