First Page | Document Content | |
---|---|---|
Date: 2007-02-22 22:55:51Cryptography Ciphertext indistinguishability Chosen-ciphertext attack Adaptive chosen-ciphertext attack Ciphertext Secure multi-party computation Cryptosystem Data anonymization ElGamal encryption | Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USAAdd to Reading ListSource URL: www.cyber-ta.orgDownload Document from Source WebsiteFile Size: 212,29 KBShare Document on Facebook |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1xVFh - View Document | |
Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† AbstractDocID: 1uJpL - View Document | |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1tQVA - View Document | |
Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ AbstractDocID: 1tqoX - View Document |