First Page | Document Content | |
---|---|---|
![]() Date: 2004-09-02 16:32:09Cramer–Shoup cryptosystem Plaintext-aware encryption Adaptive chosen-ciphertext attack Chosen-ciphertext attack Chosen-plaintext attack Ciphertext Advantage ElGamal encryption Cipher Cryptography Public-key cryptography Ciphertext indistinguishability | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 297,41 KBShare Document on Facebook |
![]() | Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using aDocID: 1q9YH - View Document |
![]() | U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006DocID: 1awS4 - View Document |
![]() | An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAILDocID: 14a4m - View Document |
![]() | An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAILDocID: 13SPZ - View Document |
![]() | Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2DocID: 12P4p - View Document |