Ciphertext

Results: 697



#Item
141Quantum information science / Quantum cryptography / Models of computation / Ciphertext indistinguishability / Semantic security / Quantum circuit / Quantum key distribution / Quantum computer / Quantum channel / Cryptography / Theoretical computer science / Applied mathematics

Semantic Security and Indistinguishability in the Quantum World April 20, 2015 Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 15:29:56
142Deduction / Differential geometry / Symbol / Differential geometry of curves / Entailment / Logic / Abstract algebra / Geometry

Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext Yan Zhu, Xin Wang, RuiQi Guo Di Ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 05:08:45
143Ciphertext / Triple DES / Advanced Encryption Standard / Cipher / Stream cipher / RC4 / Meet-in-the-middle attack / Block size / ICE / Cryptography / Data Encryption Standard / Block cipher

Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-08 16:07:20
144Ciphertext / RSA / Cipher / Semantic security / Paillier cryptosystem / ElGamal encryption / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
145Advantage / Ciphertext indistinguishability / Support / Security / Spectral theory / Cyberwarfare / Mathematics / Digital photography / Digital watermarking / Watermarking

Watermarking Cryptographic Programs Against Arbitrary Removal Strategies Ryo Nishimaki∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 16:08:47
146Ciphertext / Cyclic redundancy check / RSA / Known-plaintext attack / Cipher / Cryptography / Block cipher modes of operation / Stream cipher

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
147Information / Cryptographic protocols / Free software / ProVerif / Ciphertext indistinguishability / Communications protocol / Cryptographic primitive / Authentication / Tor / Cryptography / Cryptographic software / Data

Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-21 15:33:34
148Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
149Initialization vector / Symmetric-key algorithm / Stream cipher / Block size / Ciphertext / RC4 / Triple DES / Cipher / Crypto++ / Cryptography / Block cipher modes of operation / Block cipher

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
150One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
UPDATE