<--- Back to Details
First PageDocument Content
Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security
Date: 2004-04-30 07:59:55
Ciphertext indistinguishability
Adaptive chosen-ciphertext attack
Malleability
Chosen-ciphertext attack
Plaintext-aware encryption
Advantage
RSA
Ciphertext
Deterministic encryption
Cryptography
Optimal asymmetric encryption padding
Semantic security

Add to Reading List

Source URL: www.di.ens.fr

Download Document from Source Website

File Size: 217,39 KB

Share Document on Facebook

Similar Documents

Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

DocID: 1qCnF - View Document

Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1qxjY - View Document

Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

DocID: 1pPLX - View Document

Transport Layer Security / Secure communication / Cryptography / E-commerce / Cryptographic protocols / DROWN attack / Padding oracle attack / OpenSSL / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Padding

Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

DocID: 1pHoB - View Document

ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

DocID: 1pov5 - View Document