Ciphertext indistinguishability

Results: 264



#Item
81Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
82Needham–Schroeder protocol / Ciphertext indistinguishability / Kerberos / Advantage / XTR / Ticket Granting Ticket / Cryptography / Cryptographic protocols / Computer network security

Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:17:14
83Ciphertext indistinguishability / RSA / Probabilistic encryption / Oblivious transfer / IP / Index of cryptography articles / Blum–Goldwasser cryptosystem / Cryptography / Electronic commerce / Public-key cryptography

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
84Commitment scheme / Advantage / Ciphertext indistinguishability / Secure multi-party computation / RSA / Semantic security / Cryptography / Cryptographic protocols / Universal composability

Games and the Impossibility of Realizable Ideal Functionality Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Ajith Ramanathan1 , and Andre Scedrov2 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:29:59
85Ciphertext indistinguishability / Public-key cryptography / Internet Key Exchange / Whitfield Diffie / Index of cryptography articles / Station-to-Station protocol / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols Arnab Roy1 , Anupam Datta2 , John C. Mitchell1 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-10-07 02:05:31
86Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
87Ciphertext indistinguishability / Deniable encryption / Semantic security / Public-key cryptography / Applied mathematics / Cipher / Probabilistic encryption / Cryptography / Cyberwarfare / Security

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 09:46:16
88Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-27 15:51:40
89RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Cipher / Advantage / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:52:37
90Steganography / Advantage / Ciphertext indistinguishability / RSA / Information theory / Cyberwarfare / Security / Espionage / Public-key cryptography / Cryptography

Public-Key Steganography Luis von Ahn and Nicholas J. Hopper Carnegie Mellon University Abstract. Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidd

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-06 19:00:02
UPDATE