Ciphertext

Results: 697



#Item
221Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 23:38:04
222Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
223Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
224Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
225Software / Universal composability / Data / Secure multi-party computation / Advantage / Actor model / Ciphertext indistinguishability / Adversary model / Security parameter / Cryptographic protocols / Cryptography / Computing

On Concurrently Secure Computation in the Multiple Ideal Query Model∗ Abhishek Jain‡ Vipul Goyal†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 10:35:40
226Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
227Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
228Authenticated encryption / Semantic security / RSA / ElGamal encryption / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Signcryption / Ciphertext / Malleability / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
229Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
230Ciphertext indistinguishability / Ciphertext / Security / Semantic security / RSA / Applied mathematics / Cryptography / Homomorphic encryption / Cyberwarfare

Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE∗ Michael Clear† and Ciar´an McGoldrick School of Computer Science and Statistics, Trinity College Dublin {clearm, Ciaran.McGoldri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-29 11:13:19
UPDATE