Semantic security

Results: 252



#Item
221Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack / Methicillin-resistant Staphylococcus aureus / Malleability / Digital signature / Semantic security / Chosen-ciphertext attack / ID-based encryption / PKCS / Cryptography / Public-key cryptography / RSA

Simple Identity-Based Cryptography with Mediated RSA ? Xuhua Ding and Gene Tsudik Department of Information and Computer Science, University of California, Irvine. Email: {xhding,gts}@ics.uci.edu

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2005-07-01 12:17:37
222Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / Malleability / Random oracle / Mihir Bellare / Semantic security / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
223Advantage / Chosen-ciphertext attack / Semantic security / Ciphertext / Chosen-plaintext attack / Cipher / ElGamal encryption / Cryptography / Public-key cryptography / Proxy re-encryption

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-12-07 02:49:54
224Deterministic encryption / RSA / Cipher / One-time pad / Encryption / Authenticated encryption / Ciphertext indistinguishability / Cramer–Shoup cryptosystem / Cryptography / Semantic security / Ciphertext stealing

CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-13 00:34:50
225Electronic commerce / Semantic security / CBC-MAC / RSA / Chosen-plaintext attack / Malleability / Index of cryptography articles / Cryptography / Public-key cryptography / Block cipher modes of operation

CS255: Cryptography and Computer Security Winter 2011 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-29 15:51:55
226Semantic security / Advantage / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Ciphertext indistinguishability / Cryptography / Finite fields / Cryptographic protocols

CS255: Introduction to Cryptography Winter 2014 Assignment #2: Solutions Answer 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-15 12:14:59
227Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
228ID-based encryption / Forcing / Semantic security / Diffie–Hellman problem / Cryptography / Boneh/Franklin scheme / Advantage

Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 13:45:26
229Paillier cryptosystem / ElGamal encryption / Homomorphic encryption / Threshold cryptosystem / Goldwasser–Micali cryptosystem / Chosen-ciphertext attack / RSA / Semantic security / Key / Cryptography / Public-key cryptography / Electronic commerce

Author manuscript, published in "Financial Cryptography, 4th International Conference[removed]104"

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2011-02-11 09:14:00
230Decisional composite residuosity assumption / Rabin cryptosystem / Goldwasser–Micali cryptosystem / RSA / Probabilistic encryption / Quadratic residue / Merkle–Hellman knapsack cryptosystem / Homomorphic encryption / Semantic security / Cryptography / Public-key cryptography / Paillier cryptosystem

LNCS[removed]Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

Add to Reading List

Source URL: www.liammorris.com

Language: English - Date: 2013-04-30 09:09:49
UPDATE