Malleability

Results: 104



#Item
61Malleability / Locally decodable code / Forward error correction / Ciphertext indistinguishability / Code / Mathematics / Information / Telecommunications engineering / Error detection and correction / Cryptography / Coding theory

Locally Decodable and Updatable Non-Malleable Codes and Their Applications Dana Dachman-Soled University of Maryland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 09:13:58
62RSA / Malleability / Key encapsulation / ElGamal encryption / Symmetric-key algorithm / Cipher / Homomorphic encryption / Semantic security / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Deniable encryption

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
63Secure communication / Cryptographic protocols / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Yale University Department of Computer Science Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs David Isaac Wolinsky

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-28 11:34:07
64Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
65Neurophysiology / Neurology / Long-term depression / Spike-timing-dependent plasticity / Schaffer collateral / Synaptic plasticity / Long-term potentiation / Excitatory postsynaptic potential / Chemical synapse / Biology / Neuroscience / Nervous system

6610 • The Journal of Neuroscience, June 14, 2006 • 26(24):6610 – 6617 Developmental/Plasticity/Repair Malleability of Spike-Timing-Dependent Plasticity at the CA3–CA1 Synapse

Add to Reading List

Source URL: molbio.princeton.edu

Language: English - Date: 2014-03-25 17:03:48
66Block cipher modes of operation / Ciphertext indistinguishability / Chosen-plaintext attack / Ciphertext / Malleability / Cryptography / Espionage / Cyberwarfare

First Modes of Operation Workshop (October[removed]New Modes of Encryption - A Perspective and a Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:23:40
67Plaintext-aware encryption / Malleability / Advantage / Block cipher modes of operation / Chosen-ciphertext attack / Ciphertext / Cryptography / Chosen-plaintext attack / Ciphertext indistinguishability

First Modes of Operation Workshop (October 2000): A Message Integrity in Symmetric Encryption Message-Int4.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:32:39
68Pseudorandom generator / Malleability / Commitment scheme / Semantic security / Provable security / Pseudorandom function family / Secure multi-party computation / Pseudorandom number generator / Cramer–Shoup cryptosystem / Cryptography / Random oracle / One-way function

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
69Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
70Malleability / Semantic security / Commitment scheme / Zero-knowledge proof / Chosen-ciphertext attack / Interactive proof system / RSA / Non-interactive zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One Rafael Pass1 , abhi shelat2 , and Vinod Vaikuntanathan3 1 Cornell University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:17
UPDATE