Ciphertext

Results: 697



#Item
131Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
132Ciphertext indistinguishability / Cryptography

Publicly Verifiable Software Watermarking Aloni Cohen∗ Justin Holmgren† Vinod Vaikuntanathan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-27 00:38:23
133Ciphertext / RSA / GOST / Cryptanalysis / Block cipher / Tiny Encryption Algorithm / Differential cryptanalysis / Treyfer / Cryptography / GOST standards / Advanced Encryption Standard

Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, and Amr M. Youssef Abstract Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-17 22:22:42
134RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
135Abstract algebra / Linear algebra / Cryptography / Theoretical computer science / Vector space / Vehicle Identification Number / Matrix / Ciphertext indistinguishability / Algorithm / Algebra / Mathematics / Vectors

Nearly Optimal Verifiable Data Streaming Johannes Krupp1 , Dominique Schr¨ oder1 , Mark Simkin1 , Dario Fiore2 , Giuseppe Ateniese3,4 , and Stefan Nuernberger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 09:30:26
136Stream ciphers / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / ElGamal encryption / Key / Cryptanalysis / RSA / Cryptography / Public-key cryptography / Key management

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
137Bootstrapping / Secure multi-party computation / Cyberwarfare / Encryption / Security / Secrecy / Cryptography / Homomorphic encryption / Ciphertext

Bootstrapping BGV ciphertexts with a wider choice of p and q Emmanuela Orsini, Joop van de Pol, Nigel Smart Department of Computer Science University of Bristol

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:31:46
138Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
139Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
140Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
UPDATE