First Page | Document Content | |
---|---|---|
![]() Date: 2006-04-21 13:28:03Plaintext-aware encryption Optimal asymmetric encryption padding Cramer–Shoup cryptosystem Ciphertext Advantage Cipher Paillier cryptosystem Probabilistic encryption Cryptography Ciphertext indistinguishability Semantic security | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 272,60 KBShare Document on Facebook |
![]() | Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIREDocID: 19hjI - View Document |
![]() | Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU CryptosystemsDocID: 15gyL - View Document |
![]() | Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†DocID: 143yQ - View Document |
![]() | Ciphertext-Policy Attribute-Based EncryptionDocID: 13IYb - View Document |
![]() | Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218DocID: 13BB3 - View Document |