Back to Results
First PageMeta Content
One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack


Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India
Add to Reading List

Document Date: 2015-04-19 14:57:29


Open Document

File Size: 607,70 KB

Share Result on Facebook

City

Perm / OAEP / Taipei / /

Company

Oracle / /

Country

Taiwan / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology / /

IndustryTerm

deterministic algorithms / proposed crypto-systems / deterministic hashing algorithm / probabilistic algorithm / deterministic algorithm / crypto-systems / encryption algorithm / suitable solution / /

Organization

Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology / /

Person

David Pointcheval / Mihir Bellare / Duong Hieu Phan / Phillip Rogaway / Tarun Kumar Bansal Donghoon Chang / /

Position

editor / permutation model for arbitrary length messages / General / /

Product

SpAEP / T10 / CCA1/IND / CCA2 / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / cryptography / PPT algorithm / public key / encryption algorithm / Information Technology / deterministic hashing algorithm / Generic and Secure Asymmetric Encryption / one time pad encryption / final encryption / one time authentication encryption / asymmetric encryption / deterministic algorithm / secure asymmetric encryption / domain permutation encryption / OAEP-based encryption / secret key / 1 Symmetric Encryption / hashing algorithm / probabilistic algorithm / public key encryption / /

SocialTag