<--- Back to Details
First PageDocument Content
Adaptive chosen-ciphertext attack / Chosen-ciphertext attack / RSA / ElGamal encryption / Optimal asymmetric encryption padding / Malleability / Hybrid cryptosystem / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Semantic security
Date: 2003-08-14 10:56:28
Adaptive chosen-ciphertext attack
Chosen-ciphertext attack
RSA
ElGamal encryption
Optimal asymmetric encryption padding
Malleability
Hybrid cryptosystem
Paillier cryptosystem
Cramer–Shoup cryptosystem
Cryptography
Public-key cryptography
Semantic security

Add to Reading List

Source URL: www.shoup.net

Download Document from Source Website

File Size: 602,60 KB

Share Document on Facebook

Similar Documents

SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

DocID: 1suhA - View Document

SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

DocID: 1rIOu - View Document

Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

DocID: 1q9YH - View Document

Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document