<--- Back to Details
First PageDocument Content
Chosen-ciphertext attack / Malleability / Plaintext-aware encryption / Random oracle / Advantage / RSA / Padding / Ciphertext / Chosen-plaintext attack / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack
Date: 2001-09-18 05:35:50
Chosen-ciphertext attack
Malleability
Plaintext-aware encryption
Random oracle
Advantage
RSA
Padding
Ciphertext
Chosen-plaintext attack
Cryptography
Optimal asymmetric encryption padding
Adaptive chosen-ciphertext attack

Add to Reading List

Source URL: www.shoup.net

Download Document from Source Website

File Size: 273,36 KB

Share Document on Facebook

Similar Documents

Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

DocID: 1qO3E - View Document

Cryptography / Error detection and correction / E-commerce / RSA / Digital signature forgery / Digital signature / EMV / Optimal asymmetric encryption padding / Hamming weight / Hash function / Byte

Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

DocID: 1qNBV - View Document

Cryptography / RSA / Cipher / Cryptosystem / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext indistinguishability

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

DocID: 1qDIf - View Document

Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

DocID: 1pGwl - View Document