Ciphertext indistinguishability

Results: 264



#Item
111Group signature / Ciphertext indistinguishability / BLS / Public-key cryptography / RSA / Model theory / Cryptography / Digital signature / Ring signature

Pseudorandom Signatures? Nils Fleischhacker1 , Felix G¨ unther2 , Franziskus Kiefer3 , Mark Manulis3 , and Bertram Poettering4 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-04 04:14:01
112Advantage / Ciphertext indistinguishability / Cisco IOS / Oracle machine / Key-agreement protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane Q 4001, Austr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-01 20:41:44
113Malleability / Ciphertext / Chosen-plaintext attack / RSA / Plaintext-aware encryption / Paillier cryptosystem / Cryptography / Ciphertext indistinguishability / Homomorphic encryption

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
114Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
115Ciphertext indistinguishability / IP / Oracle Database / Oracle / Public-key cryptography / Random oracle / Cryptography / Advantage / Oracle machine

On Session Identifiers in Provably Secure Protocols The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited⋆ Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, and Greg Maitland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-07 21:15:33
116ID-based encryption / Advantage / Certificate-based encryption / Ciphertext / Standard model / ID-based cryptography / RSA / Cipher / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

Lecture Notes in Computer Science:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-04 06:00:47
117SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
118Advantage / Public-key cryptography / Key generation / Cryptography / Mihir Bellare / Ciphertext indistinguishability

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:59:14
119Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
120Cryptography / Finite fields / Steganography / Ciphertext indistinguishability / XTR / Information theory / Randomized algorithm / Theoretical computer science / Espionage / Applied mathematics

Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le1 ∞

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-25 15:01:13
UPDATE