1![Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University](https://www.pdfsearch.io/img/70fde351714872b02450e0041b87f62b.jpg) | Add to Reading ListSource URL: www.cs.jhu.eduLanguage: English - Date: 2016-03-22 15:58:42
|
---|
2![Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract](https://www.pdfsearch.io/img/343f7ad81c21af0b4474621027f06b00.jpg) | Add to Reading ListSource URL: www.eecs.harvard.eduLanguage: English - Date: 2008-03-14 11:17:07
|
---|
3![Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University](https://www.pdfsearch.io/img/09686f730fc40c497a3d8f8d8ab0d6fa.jpg) | Add to Reading ListSource URL: cs.jhu.eduLanguage: English - Date: 2016-05-15 12:58:31
|
---|
4![Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract](https://www.pdfsearch.io/img/a30e9d3ac9e5f8ac4e8e78aa28abddb0.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2010-03-19 16:16:22
|
---|
5![Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan, Johns Hopkins University https://www.usenix.org/conferenc Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan, Johns Hopkins University https://www.usenix.org/conferenc](https://www.pdfsearch.io/img/76a125d7e4246a03ac4bfb1f17276501.jpg) | Add to Reading ListSource URL: www.usenix.org- Date: 2016-08-10 04:01:17
|
---|
6![Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer∗ Victor Shoup† Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer∗ Victor Shoup†](https://www.pdfsearch.io/img/d8ccd4c2de7af8b9c01235b2fc1d08a9.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2001-12-12 07:16:30
|
---|
7![records can only be shared with certain groups of people. ABE requires the creation of a ciphertext policy that can grow complex based on the number of attributes. However, ABE’s use on mobile devices is limited, due t records can only be shared with certain groups of people. ABE requires the creation of a ciphertext policy that can grow complex based on the number of attributes. However, ABE’s use on mobile devices is limited, due t](https://www.pdfsearch.io/img/db026f0b912054b5ea8928eef1f85bba.jpg) | Add to Reading ListSource URL: static.usenix.org- Date: 2011-11-23 16:29:29
|
---|
8![AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand](https://www.pdfsearch.io/img/94fd1ba69577de1927020bc2276f659e.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2015-02-21 21:04:37
|
---|
9![Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway](https://www.pdfsearch.io/img/cbefde28d71a2838517196ef8ae036ee.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2003-08-29 18:48:12
|
---|