Ciphertext indistinguishability

Results: 264



#Item
91RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:10
92Block cipher modes of operation / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Block cipher / Symmetric-key algorithm / RSA / Stream ciphers / Ciphertext stealing / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
93Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
94Chosen-ciphertext attack / Pretty Good Privacy / Initialization vector / Encryption / Known-plaintext attack / Block cipher / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
95Cryptography / Ciphertext indistinguishability / Learning with errors

Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz1? , Daniel Masny1?? , Krzysztof Pietrzak2? ? ? 1 Horst-G¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 02:59:10
96RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
97Chosen-ciphertext attack / ElGamal encryption / Advantage / Chosen-plaintext attack / Hybrid cryptosystem / Integrated Encryption Scheme / Ciphertext / Cipher / RSA / Cryptography / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
98Public-key cryptography / Advantage / Chosen-ciphertext attack / Cipher / RSA / Key / Ciphertext indistinguishability / Cryptography / Semantic security / ID-based encryption

Is it possible to have CBE from CL-PKE? Bo Gyeong Kang?1 and Je Hong Park2 1 Department of Mathematics, Korea Advanced Institute of Science and Technology, 373-1 Guseong-dong, Yuseong-gu, Daejeon, , Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-02-03 07:05:45
99Chosen-ciphertext attack / Paillier cryptosystem / Advantage / Chosen-plaintext attack / ElGamal encryption / ID-based encryption / Probabilistic encryption / Cipher / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
100Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 23:38:04
UPDATE