Ciphertext

Results: 697



#Item
271Paillier cryptosystem / Commitment scheme / Advantage / RSA / Semantic security / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

On definitions of selective opening security Florian B¨ohl∗, Dennis Hofheinz†, and Daniel Kraschewski Karlsruhe Institute of Technology {Florian.Boehl,Dennis.Hofheinz,Daniel.Kraschewski}@kit.edu October 29, 2013

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-29 07:48:46
272Cipher / RSA / Probabilistic encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Advantage

Predicate Privacy in Encryption Systems Emily Shen MIT Elaine Shi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-24 17:15:01
273Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
274Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-14 15:12:37
275Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 15:22:16
276Substitution cipher / Ciphertext / Cipher / Keystream / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard

Whitenoise Laboratories Inc. Software Specifications For Tinnitus Utilizing Whitenoise Substitution

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-25 12:31:39
277Chosen-ciphertext attack / Ciphertext / Polynomial ring / NTRUEncrypt / Cryptography / Abstract algebra / Public-key cryptography

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai ∗ and Stanislav Bulygin †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 05:51:00
278ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
279Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
280Mathematics / Packaging / Security / Malleability / Tamper resistance / Noisy-channel coding theorem / Information / Telecommunications engineering / Ciphertext indistinguishability / Coding theory / Cryptography / Error detection and correction

Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak † Daniel Wichs ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-15 11:15:53
UPDATE