Ciphertext indistinguishability

Results: 264



#Item
21Cryptography / Secure multi-party computation / Fault-tolerant computer systems / Consensus / Secure two-party computation / Ciphertext indistinguishability / Raspberry Pi

Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
22Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
23Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
24Cryptography / Public-key cryptography / Digital signature / RSA / Ciphertext indistinguishability / Random oracle

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
25Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-27 22:14:05
26Complex systems theory / File sharing / Peer-to-peer / Social peer-to-peer processes / Ciphertext indistinguishability

Microsoft PowerPoint - p2p.ppt

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:32
27Ciphertext indistinguishability / Cryptography / DolevYao model / Communications protocol / Computing

Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract) Gergei Bana INRIA Paris, France

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
28Cryptography / Crypto-anarchism / Internet privacy / Mix network / Secure communication / Ciphertext indistinguishability / Message authentication code

Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
29Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-09-17 04:43:33
30Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-25 11:49:37
UPDATE