Ciphertext

Results: 697



#Item
41

Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz∗ January 19, 2013 Abstract A key-dependent message (KDM) secure encryption scheme is secure even if an adversary

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:34
    42Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

    Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2014-08-27 22:14:05
    43C++ / C++ classes / Input/output / CUDA / Ciphertext / Namespace

    Microsoft PowerPoint - cs677s15_2.pptx

    Add to Reading List

    Source URL: www.cs.stevens.edu

    Language: English - Date: 2015-01-28 03:24:13
    44Complex systems theory / File sharing / Peer-to-peer / Social peer-to-peer processes / Ciphertext indistinguishability

    Microsoft PowerPoint - p2p.ppt

    Add to Reading List

    Source URL: disco.ethz.ch

    Language: English - Date: 2014-09-26 08:36:32
    45

    Encryption Schemes Secure Against Chosen-Ciphertext Selective Opening Attacks Serge Fehr1 and Dennis Hofheinz2? and Eike Kiltz1?? and Hoeteck Wee3? ? ? 1 2

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:33
      46

      Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption⋆ ⋆⋆ Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

      Add to Reading List

      Source URL: perso.uclouvain.be

      Language: English - Date: 2008-11-18 04:38:15
        47

        Practical Chosen Ciphertext Secure Encryption from Factoring Dennis Hofheinz1? , Eike Kiltz2 , and Victor Shoup3 1 3

        Add to Reading List

        Source URL: www.kjdf.de

        Language: English - Date: 2014-06-10 05:37:42
          48

          Practical Chosen Ciphertext Secure Encryption from Factoring Dennis Hofheinz? and Eike Kiltz?? Cryptology & Information Security Group CWI Amsterdam, The Netherlands {hofheinz,kiltz}@cwi.nl

          Add to Reading List

          Source URL: www.kjdf.de

          Language: English - Date: 2014-06-10 05:37:34
            49

            Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Dennis Hofheinz∗, Jessica Koch†, and Christoph Striecks‡ Karlsruhe Institute of Technology, Germany, {Dennis.Ho

            Add to Reading List

            Source URL: www.kjdf.de

            Language: English - Date: 2016-02-23 08:59:36
              50Ciphertext indistinguishability / Cryptography / DolevYao model / Communications protocol / Computing

              Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract) Gergei Bana INRIA Paris, France

              Add to Reading List

              Source URL: software.imdea.org

              Language: English - Date: 2014-07-17 09:25:52
              UPDATE