Chosen-ciphertext attack

Results: 243



#Item
1Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:12
2Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
3Cryptography / RSA / Cipher / Cryptosystem / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext indistinguishability

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 09:04:05
4Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:55:51
5Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
6Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:54:04
7Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-01-05 12:45:55
8Transport Layer Security / Secure communication / Cryptography / E-commerce / Cryptographic protocols / DROWN attack / Padding oracle attack / OpenSSL / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Padding

Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Add to Reading List

Source URL: drownattack.com

Language: English - Date: 2016-07-01 21:14:30
9ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
10Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
UPDATE