Ciphertext indistinguishability

Results: 264



#Item
141Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
142Mathematics / Packaging / Security / Malleability / Tamper resistance / Noisy-channel coding theorem / Information / Telecommunications engineering / Ciphertext indistinguishability / Coding theory / Cryptography / Error detection and correction

Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak † Daniel Wichs ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-15 11:15:53
143Computing / Cryptographic protocols / Models of computation / Universal composability / Turing machine / Security parameter / Computational complexity theory / Actor model / Ciphertext indistinguishability / Theoretical computer science / Applied mathematics / Cryptography

DattaKuestersMitchellRamanathan-TCC-2005.dvi

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:20:50
144Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:33:31
145Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:37:13
146Stream cipher / Chosen-plaintext attack / Block cipher / One-time pad / Cipher / RSA / Ciphertext indistinguishability / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

CS255: Cryptography and Computer Security Winter 2004 Assignment #1 Due: Wednesday, Jan. 28th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-20 16:42:25
147Stream ciphers / Ciphertext / RSA / One-time pad / Chosen-plaintext attack / Block cipher / Cipher / Paillier cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2001 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-01-25 15:17:18
148Chosen-plaintext attack / Cipher / Block cipher / RSA / DES-X / Ciphertext indistinguishability / Malleability / Cryptography / Ciphertext / One-time pad

CS255: Cryptography and Computer Security Winter 2000 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-11 23:12:09
149Cipher / RSA / Key / Chosen-plaintext attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A talk in 32 parts Onion Misc Examples

Add to Reading List

Source URL: www.linuxsa.org.au

Language: English - Date: 2011-08-14 22:08:52
150Deterministic encryption / Mathematical sciences / Science / Ciphertext indistinguishability / Cryptography / Advantage / Ciphertext

CS255: Introduction to Cryptography Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-12 00:12:50
UPDATE