Oracle attack

Results: 62



#Item
21Side channel attack / Advantage / Cryptography / Random oracle / Public-key cryptography

On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-20 20:07:33
22Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
23CAPTCHA / Alan Turing / Theoretical computer science / Turing test / Oracle machine / IP / Zero-knowledge proof / Man-in-the-middle attack / Algorithm / Cryptography / Artificial intelligence / British people

Cryptography Using Captcha Puzzles Abishek Kumarasubramanian1 , Rafail Ostrovsky1 ? , Omkant Pandey2 , and Akshay Wadia1 1 University of California, Los Angeles

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-16 04:12:08
24Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
25Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
26ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
27Random oracle / Side channel attack / Leakage / Pseudorandom generator / RSA / Digital signature / Information leakage / Cryptography / Public-key cryptography / Timing attack

Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-17 13:35:44
28Key / RSA / Advantage / Chosen-plaintext attack / Random oracle / Randomness / Probabilistic encryption / Ciphertext indistinguishability / Cryptography / Randomness extractor / Strong secrecy

Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
29Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
UPDATE