First Page | Document Content | |
---|---|---|
![]() Date: 2015-05-04 18:43:48Espionage Security Cipher RSA ID-based encryption Chosen-ciphertext attack Chosen-plaintext attack Cramer–Shoup cryptosystem ElGamal encryption Public-key cryptography Cryptography Cyberwarfare | Add to Reading List |
![]() | Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIREDocID: 19hjI - View Document |
![]() | Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU CryptosystemsDocID: 15gyL - View Document |
![]() | Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†DocID: 143yQ - View Document |
![]() | Ciphertext-Policy Attribute-Based EncryptionDocID: 13IYb - View Document |
![]() | Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218DocID: 13BB3 - View Document |