<--- Back to Details
First PageDocument Content
Adaptive chosen-ciphertext attack / Chosen-ciphertext attack / RSA / ElGamal encryption / Optimal asymmetric encryption padding / Malleability / Hybrid cryptosystem / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Semantic security
Date: 2003-08-14 10:56:28
Adaptive chosen-ciphertext attack
Chosen-ciphertext attack
RSA
ElGamal encryption
Optimal asymmetric encryption padding
Malleability
Hybrid cryptosystem
Paillier cryptosystem
Cramer–Shoup cryptosystem
Cryptography
Public-key cryptography
Semantic security

Add to Reading List

Source URL: www.shoup.net

Download Document from Source Website

File Size: 602,60 KB

Share Document on Facebook

Similar Documents

ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

DocID: 19hjI - View Document

Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

DocID: 15gyL - View Document

RSA / Chosen-ciphertext attack / XTR / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Cipher

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

DocID: 143yQ - View Document

Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

DocID: 13IYb - View Document

Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

DocID: 13BB3 - View Document