Ciphertext

Results: 697



#Item
101

Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters ∗ University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-20 15:30:13
    102

    Ciphertext-Policy Attribute-Based Encryption John Bethencourt Carnegie Mellon University Amit Sahai

    Add to Reading List

    Source URL: www.cyber-ta.org

    Language: English - Date: 2007-03-24 01:06:06
      103

      Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2001-12-17 07:56:45
        104

        Key recovery attacks on NTRU without ciphertext validation routine Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon National Security Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, , KOREA dwh,jinho

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2003-04-18 23:20:42
          105Advantage / RSA / One-time pad / Ciphertext / Probabilistic encryption / Blum–Goldwasser cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

          Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2013-04-25 09:16:13
          106RSA / Rabin cryptosystem / Ciphertext / Cipher / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

          The BlueJay Ultra-Lightweight Hybrid Cryptosystem

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2012-06-05 18:18:20
          107Ciphertext / Stream cipher / Advantage / Cryptanalysis / Cipher / Chosen-plaintext attack / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher / Feistel cipher

          Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2013-02-04 12:37:29
          108Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

          CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

          Add to Reading List

          Source URL: www.cs.berkeley.edu

          Language: English - Date: 2015-01-21 19:48:43
          109Ciphertext indistinguishability / IP / Oracle machine / Mathematics / Cryptography / Advantage / Applied mathematics

          CS 276: Cryptography Lecture Notes Todd Kosloff February 18, 2004 First Half Last time, we talked about definitions of security for symmetric key cryptosystems. We can use these definitions to prove that various

          Add to Reading List

          Source URL: www.cs.berkeley.edu

          Language: English - Date: 2015-01-21 19:48:42
          110Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

          Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2015-05-23 10:19:24
          UPDATE