Showing 1 - 20 results of 28 for search '"chosen ciphertext attack"', query time: 0.13s Refine Results
  1. 1
    by Chatterjee, Sanjit, Sarkar, Palash
    Published 2011
    Table of Contents: “… Ciphertext Attacks -- IBE in Adaptive-Identity Model Without Random Oracles -- Further IBE Constructions…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    Published 2002
    Table of Contents: “…-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack -- Reduction Proofs…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    Published 2000
    Table of Contents: “…XTR and NTRU -- The XTR Public Key System -- A Chosen-Ciphertext Attack against NTRU -- Privacy…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
    Published 1998
    Table of Contents: “…Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 5
    Published 2004
    Table of Contents: “… Adversaries -- Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2006
    Table of Contents: “… Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2006
    Table of Contents: “… Power Functions -- Stream Ciphers II -- Chosen-Ciphertext Attacks Against MOSQUITO -- Distinguishing…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2013
    Table of Contents: “… Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2002
    Table of Contents: “… at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2006
    Table of Contents: “… and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2019
    Table of Contents: “…-Ciphertext Attacks against Feistel Ciphers -- Automatic Search for A Variant of Division Property Using Three…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 1999
    Table of Contents: “… Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) -- Proving in Zero-Knowledge…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2015
    Table of Contents: “… -- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks -- A Fast Phase…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2001
    Table of Contents: “… -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2007
    Table of Contents: “…-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2013
    Table of Contents: “… Leakage Chosen Ciphertext Attacks -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 2003
    Table of Contents: “… Secure against Adaptive Chosen Ciphertext Attack -- Sequential Key Derivation Patterns for Broadcast…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2009
    Table of Contents: “… against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
    Published 2015
    Table of Contents: “… Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 20
    Published 2001
    Table of Contents: “… Cryptosystems Secure against Chosen-Ciphertext Attacks -- Two-Party Protocols -- Oblivious Polynomial Evaluation…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search