<--- Back to Details
First PageDocument Content
Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack
Date: 2006-01-05 12:45:55
Cryptography
CramerShoup cryptosystem
Ciphertext indistinguishability
Malleability
Semantic security
Chosen-ciphertext attack
Adaptive chosen-ciphertext attack
Encryption
Block cipher mode of operation
Attack model
Probabilistic encryption
Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Download Document from Source Website

File Size: 88,86 KB

Share Document on Facebook

Similar Documents

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Randomized Partial Checking Revisited Shahram Khazaei,  Douglas Wikstr¨om,  February 13, 2012  Abstract

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

DocID: 1qDIf - View Document

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

DocID: 1qCnF - View Document

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1qxjY - View Document