First Page | Document Content | |
---|---|---|
![]() Date: 2003-08-14 10:56:28Adaptive chosen-ciphertext attack Chosen-ciphertext attack RSA ElGamal encryption Optimal asymmetric encryption padding Malleability Hybrid cryptosystem Paillier cryptosystem Cramer–Shoup cryptosystem Cryptography Public-key cryptography Semantic security | Source URL: www.shoup.netDownload Document from Source WebsiteFile Size: 602,60 KBShare Document on Facebook |
![]() | Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIREDocID: 19hjI - View Document |
![]() | Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU CryptosystemsDocID: 15gyL - View Document |
![]() | Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†DocID: 143yQ - View Document |
![]() | Ciphertext-Policy Attribute-Based EncryptionDocID: 13IYb - View Document |
![]() | Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218DocID: 13BB3 - View Document |