Semantic security

Results: 252



#Item
241National security / Computer network security / Information science / Information retrieval / Semantic Intelligence / Latent semantic indexing / Information security / Data loss prevention software / Database / Security / Computer security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.nextiernetworks.com

Language: English - Date: 2011-03-08 05:27:25
242Public-key cryptography / Encryption / Symmetric-key algorithm / Semantic security / Information-theoretic security / Chosen-plaintext attack / ElGamal encryption / Data Encryption Standard / DES-X / Cryptography / Cipher / Authenticated encryption

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-05-11 20:53:55
243Ciphertext indistinguishability / Paillier cryptosystem / Semantic security / Threshold cryptosystem / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / ElGamal encryption / RSA / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-05-19 13:27:55
244Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

PDF Document

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
245Semantic security / Block cipher modes of operation / Key Wrap / Advantage / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Initialization vector / Authenticated encryption

PDF Document

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:18:36
246Homomorphic encryption / Malleability / Blind signature / RSA / Semantic security / Digital signature / Damgård–Jurik cryptosystem / Benaloh cryptosystem / Cryptography / Public-key cryptography / Paillier cryptosystem

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2002-11-19 09:06:37
247Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / RSA / Advantage / Optimal asymmetric encryption padding / Malleability / Diffie–Hellman problem / Ciphertext / Cryptography / Public-key cryptography / Semantic security

PDF Document

Add to Reading List

Source URL: knot.kaist.ac.kr

Language: English - Date: 2002-01-21 23:23:01
248ID-based encryption / Cipher / Semantic security / Broadcast encryption / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

PDF Document

Add to Reading List

Source URL: perso.univ-rennes1.fr

Language: English - Date: 2013-02-21 17:00:27
249Plaintext-aware encryption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Ciphertext / Advantage / Cipher / Paillier cryptosystem / Probabilistic encryption / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-04-21 13:28:03
250Adaptive chosen-ciphertext attack / Chosen-ciphertext attack / RSA / ElGamal encryption / Optimal asymmetric encryption padding / Malleability / Hybrid cryptosystem / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Semantic security

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2003-08-14 10:56:28
UPDATE