Ciphertext indistinguishability

Results: 264



#Item
251Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
252ID-based encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Advanced Encryption Standard / Cryptography / Homomorphic encryption / Verifiable computing

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
253ID-based encryption / Cipher / Probabilistic encryption / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-04 02:57:54
254Public-key cryptography / Electronic commerce / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / RSA / Integrated Encryption Scheme / Cryptography / Block cipher modes of operation / Ciphertext stealing

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
255Digital signature / Perfect forward secrecy / Public key infrastructure / Key / RSA / Signcryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-05-17 17:24:40
256Ciphertext indistinguishability / Paillier cryptosystem / Semantic security / Threshold cryptosystem / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / ElGamal encryption / RSA / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-05-19 13:27:55
257Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

PDF Document

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
258ElGamal encryption / Ciphertext / RSA / Cipher / Paillier cryptosystem / Multiple encryption / Authenticated encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Proxy re-encryption

PDF Document

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2005-02-04 17:13:07
259Plaintext-aware encryption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Ciphertext / Advantage / Cipher / Paillier cryptosystem / Probabilistic encryption / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-04-21 13:28:03
260Public-key cryptography / Authenticated encryption / CMAC / Ciphertext indistinguishability / RSA / CBC-MAC / EAX mode / Cryptography / Message authentication codes / Block cipher modes of operation

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-24 22:37:11
UPDATE