Ciphertext

Results: 697



#Item
261Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-08 09:17:59
262Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
263Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
264RSA / Ciphertext stealing / Advanced Encryption Standard / Pseudorandom permutation / Cryptography / Advantage / Authenticated encryption

Revisiting Security Claims of XLS and COPA Mridul Nandi Applied Statistics Unit Indian Statistical Institute, Kolkata

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 03:10:50
265Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:33:23
266Ciphertext indistinguishability / Cipher / Malleability / RSA / Chosen-ciphertext attack / Probabilistic encryption / Chosen-plaintext attack / Cryptography / Public-key cryptography / Plaintext-aware encryption

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
267Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
268Advantage / Ciphertext / Stream cipher / Chosen-plaintext attack / Cipher / Block size / Initialization vector / Index of cryptography articles / Cryptography / Block cipher / Authenticated encryption

ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-07-29 09:57:15
269Homomorphic encryption / Applied mathematics / RSA / Cryptographic Test Correction / Ciphertext / Cipher / Semantic security / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Cryptography / Cyberwarfare / Security

C:/Documents and Settings/Administrator/My Documents/PAPERS/Accepted/EC10/IHE/latest-version/ihe.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-08 10:17:47
270Complexity classes / Obfuscation / Circuit complexity / Obfuscated code / Ciphertext indistinguishability / International Obfuscated C Code Contest / NC / Semantic security / Multilinear map / Theoretical computer science / Computer programming / Computational complexity theory

Survey on Cryptographic Obfuscation M´at´e Horv´ath∗ Laboratory of Cryptography and System Security (CrySyS Lab)† April 24, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-24 07:02:48
UPDATE