Ciphertext

Results: 697



#Item
61Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 07:57:12
62

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan David Pointcheval

Add to Reading List

Source URL: conf.ncku.edu.tw

Language: English - Date: 2003-12-17 07:15:54
    63Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

    Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:37
    64Cryptography / Public-key cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Encryption / Malleability / Mental poker

    Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:27
    65Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

    Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

    Add to Reading List

    Source URL: dedis.cs.yale.edu

    Language: English - Date: 2012-06-25 13:47:28
    66

    Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz1? , Daniel Masny1?? , Krzysztof Pietrzak2? ? ? 1 Horst-G¨

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-07-07 11:45:37
      67

      Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption Amit Sahai∗, UCLA Hakan Seyalioglu†, UCLA

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-08-01 12:12:58
        68Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

        Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

        Add to Reading List

        Source URL: isc2015.item.ntnu.no

        Language: English - Date: 2015-09-20 14:16:36
        UPDATE