Semantic security

Results: 252



#Item
31Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 07:57:12
32Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-02 12:48:47
33Crime prevention / National security / Emerging technologies / Web services / Privacy / Internet of things / Semantic Web / Internet privacy / Computer security / Criminal record / Surveillance / Information privacy

Using Future Internet Technologies to Strengthen Criminal Justice

Add to Reading List

Source URL: www.rand.org

Language: English - Date: 2015-08-18 13:47:36
34

Semantic Security and Indistinguishability in the Quantum World (extended abstract of arXiv:for QCRYPTTommaso Gagliardoni∗, Andreas H¨ ulsing†, and Christian Schaffner‡

Add to Reading List

Source URL: 2015.qcrypt.net

Language: English - Date: 2015-09-22 01:45:35
    35Internet search engines / Internet search / World Wide Web / Web query classification / Semantic Web / Personalized search / AOL search data leak / Internet privacy / Google Search / Personalization / Facebook Graph Search / Unity

    2013 Eleventh Annual Conference on Privacy, Security and Trust (PST) A Self-Adaptive Classification for the Dissociating Privacy Agent Marc Ju´arez

    Add to Reading List

    Source URL: securehomes.esat.kuleuven.be

    Language: English - Date: 2013-10-31 05:40:46
    36Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

    Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-03-17 15:01:03
    37Cryptography / Public-key cryptography / Ciphertext indistinguishability / Cryptographic protocols / Cryptographic software / Chosen-ciphertext attack / RSA / Key exchange / Advantage / CryptoVerif / Semantic security / Strong secrecy

    PDF Document

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-16 06:52:57
    38Semantic security / Optimal asymmetric encryption padding / Cipher / RSA / Advantage / Encryption / Side channel attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

    main_CameraReadyFormatting.dvi

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2012-05-14 19:11:08
    39Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

    CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-01 19:29:53
    UPDATE