Semantic security

Results: 252



#Item
61Advantage / Tiny Encryption Algorithm / Random oracle / 0K / Chosen-ciphertext attack / Cryptography / Optimal asymmetric encryption padding / Semantic security

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
62Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-05-05 15:39:42
63Advantage / Tiny Encryption Algorithm / Random oracle / 0K / Chosen-ciphertext attack / Cryptography / Optimal asymmetric encryption padding / Semantic security

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
64Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
65RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
66Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
67Quantum information science / Quantum cryptography / Models of computation / Ciphertext indistinguishability / Semantic security / Quantum circuit / Quantum key distribution / Quantum computer / Quantum channel / Cryptography / Theoretical computer science / Applied mathematics

Semantic Security and Indistinguishability in the Quantum World April 20, 2015 Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 15:29:56
68Security / Data security / Risk analysis / Vulnerability / Threat / Asset / Countermeasure / Firewall / Attack / Computer network security / Cyberwarfare / Computer security

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2009-07-27 08:02:51
69Ciphertext / RSA / Cipher / Semantic security / Paillier cryptosystem / ElGamal encryption / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
70Side channel attack / Diffie–Hellman key exchange / Advantage / Public-key cryptography / Semantic security / Cryptography / Cryptographic protocols / Random oracle

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04
UPDATE