<--- Back to Details
First PageDocument Content
Semantic security / Rabin cryptosystem / ElGamal encryption / RSA / Ciphertext indistinguishability / Chosen-ciphertext attack / Probabilistic encryption / Deterministic encryption / Ciphertext / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem
Date: 2005-05-04 15:59:05
Semantic security
Rabin cryptosystem
ElGamal encryption
RSA
Ciphertext indistinguishability
Chosen-ciphertext attack
Probabilistic encryption
Deterministic encryption
Ciphertext
Cryptography
Public-key cryptography
Cramer–Shoup cryptosystem

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 438,88 KB

Share Document on Facebook

Similar Documents

Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Cryptography / RSA / Cipher / Cryptosystem / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext indistinguishability

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

DocID: 1qDIf - View Document

Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

DocID: 1qCnF - View Document

Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1qxjY - View Document