Ciphertext

Results: 697



#Item
231Security / Cipher / Advantage / ID-based encryption / XTR / Applied mathematics / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Ciphertext indistinguishability

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 20:36:43
232Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
233Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
234Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 09:17:42
235Group signature / Ciphertext indistinguishability / BLS / Public-key cryptography / RSA / Model theory / Cryptography / Digital signature / Ring signature

Pseudorandom Signatures? Nils Fleischhacker1 , Felix G¨ unther2 , Franziskus Kiefer3 , Mark Manulis3 , and Bertram Poettering4 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-04 04:14:01
236Advantage / Ciphertext indistinguishability / Cisco IOS / Oracle machine / Key-agreement protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane Q 4001, Austr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-01 20:41:44
237Malleability / Ciphertext / Chosen-plaintext attack / RSA / Plaintext-aware encryption / Paillier cryptosystem / Cryptography / Ciphertext indistinguishability / Homomorphic encryption

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
238Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
239Ciphertext indistinguishability / IP / Oracle Database / Oracle / Public-key cryptography / Random oracle / Cryptography / Advantage / Oracle machine

On Session Identifiers in Provably Secure Protocols The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited⋆ Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, and Greg Maitland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-07 21:15:33
240ID-based encryption / Advantage / Certificate-based encryption / Ciphertext / Standard model / ID-based cryptography / RSA / Cipher / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

Lecture Notes in Computer Science:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-04 06:00:47
UPDATE