Ciphertext

Results: 697



#Item
251Linear cryptanalysis / Block cipher / ICE / Blowfish / Lucifer / Differential cryptanalysis / Advanced Encryption Standard / Ciphertext / Feistel cipher / Cryptography / Data Encryption Standard / GOST

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 10:47:29
252Advantage / Semantic security / XTR / Cyberwarfare / Security / Applied mathematics / Cryptography / ID-based encryption / Ciphertext indistinguishability

1 Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu and Hai Jin, Senior Member, IEEE

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-22 03:22:56
253Semantic security / Deterministic encryption / RSA / ElGamal encryption / Advantage / Cipher / Ciphertext indistinguishability / Plaintext-aware encryption / Cryptography / Public-key cryptography / Electronic commerce

Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 11:56:24
254ElGamal encryption / RSA / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / ID-based encryption / Cipher / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / Public-key cryptography / Proxy re-encryption

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
255Ciphertext indistinguishability / Perfect forward secrecy / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02
256Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-23 12:55:44
257Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
258RSA / Advantage / XTR / Random oracle / Probabilistic encryption / Cryptography / Optimal asymmetric encryption padding / Ciphertext indistinguishability

Fully Automated Analysis of Padding-Based Encryption in the Computational Model ´sar Kunz, Benedikt Schmidt∗ Gilles Barthe, Juan Manuel Crespo, Ce ´goire† Benjamin Gre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-03 12:04:07
259Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 08:22:01
260Chosen-ciphertext attack / Malleability / Advantage / Cramer–Shoup cryptosystem / Steganography / Ciphertext / Adaptive chosen-ciphertext attack / Cryptosystem / Cipher / Cryptography / Ciphertext indistinguishability / Semantic security

Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-26 15:47:29
UPDATE