<--- Back to Details
First PageDocument Content
Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher
Date: 2012-11-06 05:29:21
Linear cryptanalysis
Ciphertext
Differential cryptanalysis
Chosen-plaintext attack
VEST
Symmetric-key algorithm
SXAL/MBAL
Cipher
ICE
Cryptography
Stream ciphers
Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Download Document from Source Website

File Size: 163,57 KB

Share Document on Facebook

Similar Documents

Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

DocID: 1qBQm - View Document

Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document

Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

DocID: 1pPLX - View Document