<--- Back to Details
First PageDocument Content
Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding
Date: 2003-08-29 18:48:12
Cryptography
Ciphertext indistinguishability
Semantic security
Malleability
Advantage
Chosen-ciphertext attack
Chosen-plaintext attack
Encryption
RSA
Probabilistic encryption
Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Download Document from Source Website

File Size: 174,17 KB

Share Document on Facebook

Similar Documents

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

DocID: 1xTmW - View Document

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

DocID: 1vrXg - View Document

2014 IEEE Symposium on Security and Privacy  SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

2014 IEEE Symposium on Security and Privacy SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

DocID: 1vkJQ - View Document

Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

DocID: 1vjer - View Document

Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

DocID: 1tQK3 - View Document