Plaintext

Results: 367



#Item
91ElGamal encryption / RSA / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / ID-based encryption / Cipher / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / Public-key cryptography / Proxy re-encryption

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
92Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-23 12:55:44
93Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 08:22:01
94Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
95Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:33:23
96Ciphertext indistinguishability / Cipher / Malleability / RSA / Chosen-ciphertext attack / Probabilistic encryption / Chosen-plaintext attack / Cryptography / Public-key cryptography / Plaintext-aware encryption

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
97Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
98Advantage / Ciphertext / Stream cipher / Chosen-plaintext attack / Cipher / Block size / Initialization vector / Index of cryptography articles / Cryptography / Block cipher / Authenticated encryption

ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-07-29 09:57:15
99Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-22 00:23:21
100Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE