Ciphertext indistinguishability

Results: 264



#Item
211Homomorphic encryption / Electronic commerce / Ciphertext indistinguishability / Secure multi-party computation / Secret sharing / Cipher / RSA / ElGamal encryption / Semantic security / Cryptography / Public-key cryptography / Cryptographic protocols

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana L´opez-Alt New York University Eran Tromer∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-07 16:19:48
212Symbol / Decisional Diffie–Hellman assumption / Applied mathematics / Cyberwarfare / Mathematics / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An Investigation of Some Forward Security Properties for PEKS and IBE Qiang Tang APSIA group, SnT, University of Luxembourg 6, rue Richard Coudenhove-Kalergi, L-1359 Luxembourg [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-17 11:29:53
213Padding / Block cipher / Cipher / Authenticated encryption / Transport Layer Security / Ciphertext stealing / Cryptography / Ciphertext indistinguishability / RSA

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-11-29 05:36:51
214RSA / Ciphertext / Advantage / Cipher / Key / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Deterministic encryption

A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 10:44:19
215Ciphertext indistinguishability / Advantage / Block cipher / Ciphertext / Cyberwarfare / Applied mathematics / Secrecy / Cryptography / Block cipher modes of operation / Authenticated encryption

The Associated-Data Problem

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:33:09
216Cryptographic protocols / Ciphertext indistinguishability / ProVerif / ElGamal encryption / Digital signature / Cramer–Shoup cryptosystem / RSA / Cryptographic primitive / Computer security / Cryptography / Public-key cryptography / Electronic commerce

MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational Proofs

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-09-28 08:57:21
217Ciphertext indistinguishability / Elliptic curve / Adversary model / Mathematics / Applied mathematics / Computer science / Analysis of algorithms / Vehicle Identification Number / Advantage

Cryptographic treatment of CryptDB’s Adjustable Join Raluca Ada Popa and Nickolai Zeldovich MIT CSAIL March 25, [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
218RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
219Free software / ProVerif / Ciphertext indistinguishability / Science / Automated theorem proving / Cachan / Mathematical sciences / Applied mathematics / Cryptography / Cryptographic protocols / Cryptographic software

Verification of equivalence properties in security protocols Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universit´es. The internship will be located at Nancy or at ENS Cachan depending on th

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2013-10-21 04:06:12
220Oracle Database / Concrete security / Universal composability / Perfect forward secrecy / Ciphertext indistinguishability / Random oracle / Cryptography / Cryptographic protocols / Oracle machine

International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
UPDATE