Ciphertext

Results: 697



#Item
91Digital signature / ID-based encryption / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper is published in the proceedings of ASIACRYPTSignature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust∗, Carmit Hazay†,

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-29 12:12:28
92Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53
93Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
94Cyberwarfare / Espionage / Cryptography / Chaocipher / Cipher

Exhibit #3 – Encipherment Grids Byrne has created a 4-page Encipherment Grid (PDF Pages 2 thru 5) displaying both the plaintext and ciphertext as found in Silent Years. For maximum size viewing of those pages, rotate

Add to Reading List

Source URL: www.mountainvistasoft.com

Language: English - Date: 2013-05-29 13:49:46
95Computational hardness assumption / Ciphertext indistinguishability / Computer security / Cyberwarfare / Science / Cryptography / Cryptographic primitive / Information-theoretic security

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
96Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
97RSA / Ciphertext / Key / Randomness extractor / Symmetric-key algorithm / Semantic security / Cryptography / Key management / Ciphertext indistinguishability

Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt† Hoeteck Wee‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-09 09:25:45
98Macroeconomics / Electronic press kit / Money / Money supply / Mathematical proof / Cryptography / Economics / Ciphertext indistinguishability

IACR School on Computer-Aided Cryptography

Add to Reading List

Source URL: www.easycrypt.info

Language: English - Date: 2015-06-01 12:29:59
99

Chosen-Ciphertext Security from Identity-Based Encryption∗ Dan Boneh† Ran Canetti‡

Add to Reading List

Source URL: www.cs.tau.ac.il

- Date: 2009-04-27 14:49:47
    100

    Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-06-19 04:38:45
      UPDATE