Semantic security

Results: 252



#Item
1Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-16 15:03:09
2

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

Add to Reading List

Source URL: www.daml.org

Language: English - Date: 2005-04-19 10:56:20
    3

    2014 IEEE Symposium on Security and Privacy SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

    Add to Reading List

    Source URL: oaklandsok.github.io

    Language: English - Date: 2018-03-14 15:33:55
      4

      Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

      Add to Reading List

      Source URL: www.daml.org

      Language: English - Date: 2005-04-19 10:56:45
        5

        Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

        Add to Reading List

        Source URL: www.daml.org

        Language: English - Date: 2005-04-19 10:56:07
          6

          Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

          Add to Reading List

          Source URL: www.ei.rub.de

          - Date: 2014-10-22 03:57:33
            7Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

            Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2003-08-29 18:48:12
            8Software / Computer security / Prevention / Computer access control / Password / Security / Login / Expect / Semantic URL attack / Password policy

            Journey TM College Student Registration Instructions Student Name: .

            Add to Reading List

            Source URL: www.irsc.edu

            Language: English - Date: 2016-01-12 09:58:01
            9Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

            An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2007-08-20 03:23:28
            10Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

            Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2016-01-26 19:57:17
            UPDATE