Chosen-plaintext attack

Results: 179



#Item
91ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
92Ciphertext indistinguishability / Semantic security / Advantage / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Ciphertext / Chosen-plaintext attack / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
93ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
94Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
95Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
96Transport Layer Security / Chosen-plaintext attack / HTTP Secure / Ciphertext / Block cipher modes of operation / Authenticated encryption / Password / Probabilistic encryption / Known-plaintext attack / Cryptography / Security / Initialization vector

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
97Ciphertext indistinguishability / Voronoi diagram / Chosen-plaintext attack / Cryptography / Homomorphic encryption / RSA

Secure Nearest Neighbor Revisited Bin Yao1 , Feifei Li2 , Xiaokui Xiao3 1 Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2013-07-08 15:39:55
98Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]Dag Arne Osvik1 , Adi Shamir2 and Eran Tromer2 1

Add to Reading List

Source URL: www.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
99Homomorphic encryption / Cipher / Encryption / Public-key cryptography / Key / Plaintext / Chosen-plaintext attack / Deterministic encryption / Cryptography / Cyberwarfare / Security

Top 10 Challenges in Cryptography for Big Data Arnab Roy Software Systems Innovation Group Fujitsu Laboratories of America

Add to Reading List

Source URL: www.fujitsu.com

Language: English - Date: 2014-02-05 05:45:47
100Block cipher modes of operation / Ciphertext indistinguishability / Chosen-plaintext attack / Ciphertext / Malleability / Cryptography / Espionage / Cyberwarfare

First Modes of Operation Workshop (October[removed]New Modes of Encryption - A Perspective and a Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:23:40
UPDATE