<--- Back to Details
First PageDocument Content
Cramer–Shoup cryptosystem / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Chosen-ciphertext attack / Chosen-plaintext attack / Ciphertext / Advantage / ElGamal encryption / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability
Date: 2004-09-02 16:32:09
Cramer–Shoup cryptosystem
Plaintext-aware encryption
Adaptive chosen-ciphertext attack
Chosen-ciphertext attack
Chosen-plaintext attack
Ciphertext
Advantage
ElGamal encryption
Cipher
Cryptography
Public-key cryptography
Ciphertext indistinguishability

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 297,41 KB

Share Document on Facebook

Similar Documents

ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

DocID: 19hjI - View Document

Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

DocID: 15gyL - View Document

RSA / Chosen-ciphertext attack / XTR / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Cipher

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

DocID: 143yQ - View Document

Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

DocID: 13IYb - View Document

Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

DocID: 13BB3 - View Document