Probabilistic encryption

Results: 76



#Item
61Decisional composite residuosity assumption / Rabin cryptosystem / Goldwasser–Micali cryptosystem / RSA / Probabilistic encryption / Quadratic residue / Merkle–Hellman knapsack cryptosystem / Homomorphic encryption / Semantic security / Cryptography / Public-key cryptography / Paillier cryptosystem

LNCS[removed]Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

Add to Reading List

Source URL: www.liammorris.com

Language: English - Date: 2013-04-30 09:09:49
62Probabilistic encryption / Probability theory / Random oracle / RSA / Advantage / Chosen-ciphertext attack / Cipher / Digital signature / Key size / Cryptography / Public-key cryptography / Key management

A “proof-reading” of some issues in cryptography Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2007-10-01 04:24:00
63Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
64Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
65RSA / Fault injection / Probabilistic encryption / Advanced Encryption Standard / Paillier cryptosystem / Side channel attack / Computer security / Initialization vector / Cryptography / Public-key cryptography / Electronic commerce

Author manuscript, published in "Fault Diagnosis and Tolerance in Cryptography, Santa Barbara : United States (2010)" DOI : [removed]FDTC[removed]

Add to Reading List

Source URL: hal.archives-ouvertes.fr

Language: English - Date: 2010-11-11 06:25:51
66ID-based encryption / Cipher / Probabilistic encryption / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-04 02:57:54
67Block cipher / Transport Layer Security / Stream cipher / Chosen-ciphertext attack / Cipher / Chosen-plaintext attack / RSA / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Padding

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
68Claw-free permutation / Goldwasser–Micali cryptosystem / One-way function / Probabilistic encryption / ElGamal encryption / Polynomial / XTR / Ideal lattice cryptography / Paillier cryptosystem / Cryptography / Homomorphic encryption / Commitment scheme

PDF Document

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2005-05-15 21:11:58
69Semantic security / Block cipher modes of operation / Key Wrap / Advantage / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Initialization vector / Authenticated encryption

PDF Document

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:18:36
70Plaintext-aware encryption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Ciphertext / Advantage / Cipher / Paillier cryptosystem / Probabilistic encryption / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-04-21 13:28:03
UPDATE