Oracle attack

Results: 62



#Item
51Chosen-ciphertext attack / Padding / RSA / Advantage / Random oracle / Block cipher / Ciphertext / Cipher / Stream cipher / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

An OAEP Variant With a Tight Security Proof – Draft 1.0 Jakob Jonsson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-03-18 14:07:36
52Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
53One-way compression function / Merkle–Damgård construction / Random oracle / Universal one-way hash function / Collision resistance / Hash function / Collision / Birthday attack / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
54Probabilistic encryption / Probability theory / Random oracle / RSA / Advantage / Chosen-ciphertext attack / Cipher / Digital signature / Key size / Cryptography / Public-key cryptography / Key management

A “proof-reading” of some issues in cryptography Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2007-10-01 04:24:00
55Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / IEEE P1363 / RSA / Key encapsulation / Integrated Encryption Scheme / Chosen-ciphertext attack / Block cipher modes of operation / Random oracle / Cryptography / Cryptography standards / Public-key cryptography

A Proposal for an ISO Standard for Public Key Encryption (version 2.1) Victor Shoup

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-12-20 09:19:49
56Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
57Search algorithms / Preimage attack / Collision attack / MD5 / Random oracle / Collision resistance / SHA-1 / Hash chain / Collision / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: www.cs.ut.ee

Language: English - Date: 2006-03-20 09:54:54
58Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:17
59Chosen-ciphertext attack / Malleability / Plaintext-aware encryption / Random oracle / Advantage / RSA / Padding / Ciphertext / Chosen-plaintext attack / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2001-09-18 05:35:50
60Padding / RSA / Randomness extractor / Random oracle / Ciphertext indistinguishability / Chosen-ciphertext attack / Feistel cipher / Plaintext-aware encryption / Probabilistic encryption / Cryptography / Optimal asymmetric encryption padding / Malleability

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-10-13 20:59:42
UPDATE