Semantic security

Results: 252



#Item
91Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
92Ethics / Behavior / Social psychology / Accountability / Social epistemology / Trust / Reputation / Online community / Reputation management / Sociology / Law

Usable Security and Privacy Class notes February 21, 2006 Trust and semantic attacks I Presented by Jason Chalecki

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-03-28 21:56:17
93Public-key cryptography / Advantage / Chosen-ciphertext attack / Cipher / RSA / Key / Ciphertext indistinguishability / Cryptography / Semantic security / ID-based encryption

Is it possible to have CBE from CL-PKE? Bo Gyeong Kang?1 and Je Hong Park2 1 Department of Mathematics, Korea Advanced Institute of Science and Technology, 373-1 Guseong-dong, Yuseong-gu, Daejeon, , Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-02-03 07:05:45
94Software development / Hacking / Vulnerability / Semantic Web / Software development methodology / Computer security / Software testing / Cyberwarfare

Semantic Web Methodology Semantic Web Methodolgy  Steps for a Semantic Web Methodology

Add to Reading List

Source URL: scap.nist.gov

Language: English
95Phishing / Internet / Netcraft / Computer network security / Anti-Phishing Working Group / Password / Crime / Computing / Anti-phishing software / Spamming / Social engineering / Computer crimes

Usable Privacy and Security Trust and semantic attacks II Lecture and notes written by Ponnurangam K Lecture notes, Discussion and Activity February 23, 2006

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-28 21:37:15
96Public-key cryptography / Encryption / Digital signature / One-time pad / Key / Probabilistic encryption / Semantic security / Cryptography / Cipher / Signcryption

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
97Authenticated encryption / Semantic security / RSA / ElGamal encryption / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Signcryption / Ciphertext / Malleability / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
98Ciphertext indistinguishability / Ciphertext / Security / Semantic security / RSA / Applied mathematics / Cryptography / Homomorphic encryption / Cyberwarfare

Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE∗ Michael Clear† and Ciar´an McGoldrick School of Computer Science and Statistics, Trinity College Dublin {clearm, Ciaran.McGoldri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-29 11:13:19
99Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 09:17:42
100Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
UPDATE