<--- Back to Details
First PageDocument Content
RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption
Date: 2013-09-14 01:51:10
RSA
Chosen-plaintext attack
Ciphertext
Homomorphic encryption
Advantage
Cipher
Adaptive chosen-ciphertext attack
Plaintext-aware encryption
Cryptography
Ciphertext indistinguishability
Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Download Document from Source Website

File Size: 701,99 KB

Share Document on Facebook

Similar Documents

Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey†  Omer Reingold∗

Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey† Omer Reingold∗

DocID: 1tpV3 - View Document

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

DocID: 1tou0 - View Document

Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

DocID: 1to2J - View Document

Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1

Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1

DocID: 1rFtp - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document