Ciphertext

Results: 697



#Item
431Plaintext-aware encryption / Malleability / Advantage / Block cipher modes of operation / Chosen-ciphertext attack / Ciphertext / Cryptography / Chosen-plaintext attack / Ciphertext indistinguishability

First Modes of Operation Workshop (October 2000): A Message Integrity in Symmetric Encryption Message-Int4.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:32:39
432Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
433Semantic security / Internet standards / Ciphertext indistinguishability / Obfuscated code / Percent-encoding / Obfuscation / Encoding / Silicon monoxide / Advantage / Computing / Cryptography / Mind

On Virtual Grey Box Obfuscation for General Circuits∗ Nir Bitansky† Ran Canetti‡ Yael Tauman Kalai§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-18 10:52:47
434Applied mathematics / Ciphertext indistinguishability / Public-key cryptography / Semantic security / RSA / Cipher / ID-based encryption / Probabilistic encryption / Authenticated encryption / Cryptography / Cyberwarfare / Security

Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-24 01:51:53
435Diffie–Hellman key exchange / Cryptography / Ciphertext indistinguishability / Advantage

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption∗ Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay Department of Mathematics Indian Institute of Technology Kharagpur K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-28 02:48:34
436Security / Semantic security / Advantage / Secrecy / Proxy re-encryption / Obfuscation / RSA / Encryption / Hardware obfuscation / Cryptography / Cyberwarfare / Ciphertext indistinguishability

Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:25:07
437Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
438Malleability / Semantic security / Commitment scheme / Zero-knowledge proof / Chosen-ciphertext attack / Interactive proof system / RSA / Non-interactive zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One Rafael Pass1 , abhi shelat2 , and Vinod Vaikuntanathan3 1 Cornell University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:17
439Advanced Encryption Standard / Cipher / Entropic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal ∗ Sergey Gorbunov†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-10-01 16:31:30
440Secure Shell / Cryptographic protocols / Block cipher modes of operation / Stream cipher / OpenSSH / Padding / Block cipher / Authenticated encryption / Ciphertext / Cryptography / Electronic commerce / Cryptographic software

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
UPDATE