Malleability

Results: 104



#Item
31Authenticated encryption / Semantic security / RSA / ElGamal encryption / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Signcryption / Ciphertext / Malleability / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
32Zero-knowledge proof / Proof of knowledge / Interactive proof system / IP / Soundness / NP / Random oracle / Probabilistically checkable proof / Fiat-Shamir heuristic / Cryptography / Cryptographic protocols / Non-interactive zero-knowledge proof

An extended abstract of this paper is published in the proceedings of the 13th International Conference on Cryptology in India [21] – IndocryptThis is the full version. On the Non-malleability of the Fiat-Shamir

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-16 15:16:50
33Malleability / Ciphertext / Chosen-plaintext attack / RSA / Plaintext-aware encryption / Paillier cryptosystem / Cryptography / Ciphertext indistinguishability / Homomorphic encryption

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
34Chosen-ciphertext attack / Malleability / Advantage / Cramer–Shoup cryptosystem / Steganography / Ciphertext / Adaptive chosen-ciphertext attack / Cryptosystem / Cipher / Cryptography / Ciphertext indistinguishability / Semantic security

Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-26 15:47:29
35Ciphertext indistinguishability / Cipher / Malleability / RSA / Chosen-ciphertext attack / Probabilistic encryption / Chosen-plaintext attack / Cryptography / Public-key cryptography / Plaintext-aware encryption

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
36Mathematics / Packaging / Security / Malleability / Tamper resistance / Noisy-channel coding theorem / Information / Telecommunications engineering / Ciphertext indistinguishability / Coding theory / Cryptography / Error detection and correction

Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak † Daniel Wichs ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-15 11:15:53
37Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
38Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:20
39Chosen-plaintext attack / Cipher / Block cipher / RSA / DES-X / Ciphertext indistinguishability / Malleability / Cryptography / Ciphertext / One-time pad

CS255: Cryptography and Computer Security Winter 2000 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-11 23:12:09
40Mind / Science / Social inequality / Stereotype threat / Stereotype / Intelligence quotient / G factor / Malleability of intelligence / Social psychology / Psychology / Intelligence / Educational psychology

Journal of Experimental Social Psychology 37, 000 – [removed]doi:[removed]jesp[removed], available online at http://www.idealibrary.com on Reducing the Effects of Stereotype Threat on African American College Student

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2009-10-13 10:09:43
UPDATE