Cramer–Shoup cryptosystem

Results: 42



#Item
31Random oracle / Digital signature / Standard model / RSA / Cramer–Shoup cryptosystem / Public key certificate / Strong RSA assumption / Advantage / BLS / Cryptography / Public-key cryptography / Group signature

Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-08 16:56:54
32Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
33Semantic security / XTR / ID-based encryption / Security / Applied mathematics / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Cyberwarfare

Witness Encryption from Instance Independent Assumptions Craig Gentry IBM Research, T.J. Watson [removed] Allison Bishop Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-30 01:07:28
34Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
35Deterministic encryption / RSA / Cipher / One-time pad / Encryption / Authenticated encryption / Ciphertext indistinguishability / Cramer–Shoup cryptosystem / Cryptography / Semantic security / Ciphertext stealing

CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-13 00:34:50
36ElGamal encryption / Ciphertext / Challenge-response authentication / Online Certificate Status Protocol / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2006

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-28 13:20:41
37Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-10-07 02:19:01
38Plaintext-aware encryption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Ciphertext / Advantage / Cipher / Paillier cryptosystem / Probabilistic encryption / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-04-21 13:28:03
39Cryptographic hash functions / Artificial intelligence / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Leftover hash lemma / Cramer–Shoup cryptosystem / Tabulation hashing / Hashing / Cryptography / Search algorithms

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2001-12-12 07:00:25
40Adaptive chosen-ciphertext attack / Chosen-ciphertext attack / RSA / ElGamal encryption / Optimal asymmetric encryption padding / Malleability / Hybrid cryptosystem / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Semantic security

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2003-08-14 10:56:28
UPDATE