Semantic security

Results: 252



#Item
21Public-key cryptography / Cryptography / Encryption / Ciphertext indistinguishability / Attribute-based encryption / ID-based encryption / RSA / Cipher / Data Encryption Standard / Identity-based conditional proxy re-encryption / Semantic security

2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:14
22ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
23Paillier cryptosystem / RSA / Semantic security / XTR

LNCSAn Adaptively Secure Mix-Net Without Erasures

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:48:38
24Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
25Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
26Cryptography / Identity management / Password / Security / Passphrase / Crypt / Login / Expect / Password fatigue / Password management

1 Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 20:49:52
27Information science / Semantic Web / Knowledge / Information / Knowledge engineering / Knowledge representation / Technical communication / Ontology / George Mason University / Semantic technology / Electronic submission / Web Ontology Language

Preliminary Call for Papers Eleventh International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDSGeorge Mason University, Fairfax, VA, USA Institute for Defense Analyses, Alexandr

Add to Reading List

Source URL: stids.c4i.gmu.edu

Language: English - Date: 2016-04-15 10:07:06
28Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
29Microsoft / Software / Computing / Webmail / Password / Security / Outlook.com / Email / Login / Point and click / Self-service password reset / Semantic URL attack

Guide 5 – E-mail address is in use Use these instructions if: You already created a NY.GOV ID, but not with the Department of Labor and You received a message telling you your e-mail address is already in use If you ge

Add to Reading List

Source URL: www.labor.ny.gov

Language: English - Date: 2013-03-01 17:05:53
30Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-25 11:49:37
UPDATE