Malleability

Results: 104



#Item
21Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45
22Systems engineering / Opteron / Parallel computing / Computer cluster / Grid computing / Computing / Fault-tolerant computer systems / Middleware

AUTONOMIC GRID COMPUTING USING MALLEABILITY AND MIGRATION: AN ACTOR-ORIENTED SOFTWARE FRAMEWORK By Travis Desell A Thesis Submitted to the Graduate

Add to Reading List

Source URL: wcl.cs.rpi.edu

Language: English - Date: 2015-01-22 12:33:51
23One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
24Zero-knowledge proof / Adversary model / Advantage / IP / Public-key cryptography / Communications protocol / Malleability / Cryptography / Cryptographic protocols / Commitment scheme

Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model Boaz Barak∗ May 19, 2008

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:33
25Computability theory / Mathematics / Alan Turing / Turing machine / Models of computation / Universal Turing machine / Church–Turing thesis / Halting problem / Entscheidungsproblem / Theoretical computer science / Computer science / Theory of computation

Book Review His Just Deserts: A Review of Four Books Reviewed by Alvy Ray Smith Malleability and Amplification are the twin glories

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2014-07-31 09:01:39
26Language / Contemporary art / Reading / Structuralism / Textuality / Literacy / Digital rights management / Digitizing / Digital media / Linguistics / Applied linguistics / Knowledge

The Book of the Futire: Text and Literacy in the Digital Age For optimists and pessimists alike ... the crucial issue boils down to the brain and how it adapts to screen technology. Familiar as I am with the malleability

Add to Reading List

Source URL: www.let.leidenuniv.nl

Language: English - Date: 2013-04-23 09:26:18
27Chosen-ciphertext attack / Ciphertext / Cipher / RSA / Advantage / Malleability / Ciphertext stealing / Paillier cryptosystem / Cryptography / Authenticated encryption / Block cipher modes of operation

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
28Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
29Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
30RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
UPDATE