Back to Results
First PageMeta Content
Chosen-ciphertext attack / Ciphertext / Cipher / RSA / Advantage / Malleability / Ciphertext stealing / Paillier cryptosystem / Cryptography / Authenticated encryption / Block cipher modes of operation


This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles
Add to Reading List

Document Date: 2015-05-06 09:12:34


Open Document

File Size: 357,38 KB

Share Result on Facebook

Company

Google / /

Currency

pence / /

/

Facility

End library / /

IndustryTerm

real-world applications / encryption algorithms / information to applications / compression algorithm / less satisfying fallback solution / invalid algorithm / /

Organization

French National Research Agency / /

Person

Henri Gilbert / Reinhard / Olivier Levillain / /

Position

Prime Minister / /

ProgrammingLanguage

JavaScript / /

Technology

encryption / OpenPGP.js exception messages Compression algorithm / block cipher / cryptography / proper authenticated encryption / private key / caching / secret key / encryption algorithms / 2.2 Encryption Procedures Encryption / application using encryption / packet Encryption / compression algorithm / API / OpenPGP symmetric encryption / /

URL

http /

SocialTag