Back to Results
First PageMeta Content
Chosen-ciphertext attack / Malleability / Advantage / Cramer–Shoup cryptosystem / Steganography / Ciphertext / Adaptive chosen-ciphertext attack / Cryptosystem / Cipher / Cryptography / Ciphertext indistinguishability / Semantic security


Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research
Add to Reading List

Document Date: 2004-08-26 15:47:29


Open Document

File Size: 156,67 KB

Share Result on Facebook

Company

Section 3 / Oracle / Simmons / Russell / IBM / /

/

Event

Product Issues / Product Recall / /

IndustryTerm

public communications / generation algorithm / steganographic decoding algorithm / arbitrary probabilistic polynomialtime algorithms / public-key systems / probabilistic polynomial-time algorithm / probabilistic polynomial-time algorithms / decryption algorithms / steganographic encoding algorithm / arbitrary polynomial-time algorithms / encryption algorithm / /

Position

CPA / general model for steganography / /

Product

definitions of CCA / CH-8803 / /

ProvinceOrState

South Dakota / Saskatchewan / /

Technology

encryption / cryptography / steganographic decoding algorithm / PDR-CCAsecure encryption algorithm / key generation algorithm / public key / public-key encryption / two arbitrary polynomial-time algorithms / steganographic encoding algorithm / decoding algorithm / probabilistic polynomial-time algorithms / secret key / probabilistic polynomial-time algorithm / random access / simulation / two arbitrary probabilistic polynomialtime algorithms / The key generation algorithm / decryption algorithms / /

SocialTag