Chosen-ciphertext attack

Results: 243



#Item
71Chosen-ciphertext attack / Paillier cryptosystem / Advantage / Chosen-plaintext attack / ElGamal encryption / ID-based encryption / Probabilistic encryption / Cipher / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
72Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
73Authenticated encryption / Semantic security / RSA / ElGamal encryption / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Signcryption / Ciphertext / Malleability / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
74Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
75Malleability / Ciphertext / Chosen-plaintext attack / RSA / Plaintext-aware encryption / Paillier cryptosystem / Cryptography / Ciphertext indistinguishability / Homomorphic encryption

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
76Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
77Ciphertext / Chosen-plaintext attack / ICE / Cryptanalysis / Stream cipher / Grain / Linear cryptanalysis / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Block cipher

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
78Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
79ElGamal encryption / RSA / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / ID-based encryption / Cipher / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / Public-key cryptography / Proxy re-encryption

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
80Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-23 12:55:44
UPDATE