Probabilistic encryption

Results: 76



#Item
1

Benaloh’s Dense Probabilistic Encryption Revisited Laurent Fousse 1 Pascal Lafourcade2 Mohamed Alnuaimi3

Add to Reading List

Source URL: log.lateralis.org

Language: English - Date: 2017-10-30 10:33:27
    2Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

    Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:12
    3Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

    An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:23:28
    4Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

    A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2001-10-24 10:54:04
    5Cryptography / Format-preserving encryption / Deterministic encryption / Encryption / Cipher / Data Encryption Standard / RSA / Probabilistic encryption / Block cipher

    Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2015-05-11 00:33:15
    6Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

    Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2006-01-05 12:45:55
    7Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

    Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-08-24 18:12:50
    8Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

    Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-08-24 18:12:50
    9ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

    Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-05-02 04:08:26
    10Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-01-24 20:37:43
    UPDATE