<--- Back to Details
First PageDocument Content
Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security
Date: 2004-02-01 14:57:44
Initialization vector
Probabilistic encryption
Block cipher modes of operation
Authenticated encryption
Malleability
Ciphertext
Advantage
Block cipher
Chosen-ciphertext attack
Cryptography
Ciphertext indistinguishability
Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Download Document from Source Website

File Size: 544,85 KB

Share Document on Facebook

Similar Documents

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev†  Abstract

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document