Ciphertext

Results: 697



#Item
71Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
72Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:45
73

Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Sumit Kumar Pandey, Santanu Sarkar and Mahavir Prasad Jhanwar CR Rao AIMSCS Hyderabad

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    74Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

    Add to Reading List

    Source URL: jhalderm.com

    Language: English - Date: 2015-11-02 11:01:00
    75Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    76Cryptography / Block cipher modes of operation / Ciphertext stealing / Ciphertext / Symmetric-key algorithm / Initialization vector

    The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

    Add to Reading List

    Source URL: fse2012.inria.fr

    Language: English - Date: 2012-03-23 10:23:39
    77Probability / Cryptography / Statistics / Laplace distribution / Privacy / Ciphertext indistinguishability / Exponential mechanism

    Calibrating Noise to Sensitivity in Private Data Analysis Cynthia Dwork1 , Frank McSherry1 , Kobbi Nissim2 , and Adam Smith3? 1 Microsoft Research, Silicon Valley. {dwork,mcsherry}@microsoft.com

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2009-07-21 20:16:56
    78Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

    Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-03-17 15:01:03
    79

    Science Summer School Clocks and Secret Messages - with upgraded problem! The ciphertext OH7586BB46R3627O26BB9 was produced by applying an affine cryptosystem to each letter of the following 37-letter alphabet.

    Add to Reading List

    Source URL: hamilton.nuigalway.ie

    - Date: 2015-06-25 08:28:24
      80Cryptography / Public-key cryptography / Attribute-based encryption / RSA / Ciphertext indistinguishability / Encryption / Key / Authenticated encryption / PERMIS / Ciphertext

      Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

      Add to Reading List

      Source URL: www.e7n.ch

      Language: English
      UPDATE