DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Semantic security
Semantic security
Lecture 16
Practical Homomorphic Encryption and Cryptanalysis
The Twin Diffie-Hellman Problem and Applications
Linear Generalized Elgamal Encryption Scheme Pascal Lafourcade, Léo Robert, Demba Sow
Semantic Security and Indistinguishability in the Quantum World June 1, 2016?
Exploring Naccache-Stern Knapsack Encryption
Cs 255 (Introduction to Cryptography)
Probabilistic Public-Key Encryption
Lecture 9 1 Introduction 2 Background
DHIES: an Encryption Scheme Based on the Diffie-Hellman Problem
On DRSA Public Key Cryptosystem Sahadeo Padhye School of Studies in Mathematics, Pandit Ravishankar Shukla University, India
Security II: Cryptography
The Notion of Security for Probabilistic Cryptosystems (Extended Abstract) *
A Fully Homomorphic Encryption Scheme
Semantic Security
A Graduate Course in Applied Cryptography
Semantic Security of RSA Semantic Security
Lecture 1 1 Introduction 2 Homomorphic Encryption 3 Related
Top View
Efficient Cryptosystems from 2K-Th Power Residue Symbols⋆
A Proposal for an ISO Standard for Public Key Encryption (Version 2.1)
From Semantic Security to Chosen Ciphertext Security Sahnghyun Cha Iowa State University
Circular-Secure Encryption from Decision Diffie-Hellman
The RSA Trapdoor Permutation
Relations Between Semantic Security and Indistinguishability Against Cpa, Non-Adaptive Cca and Adaptive Cca in Comparison Based Framework
Semantic Security
Security of Homomorphic Encryption
An Introduction to Probabilistic Encryption
Textbook RSA, Semantic Security, and ROM-RSA
Computer Security CS 526 Topic 4
DHIES: an Encryption Scheme Based on the Diffie-Hellman Problem
Public-Key Cryptography Public-Key Cryptography Lecture 9 Public-Key Cryptography Lecture 9 CCA Security SIM-CCA Security (PKE)
Equivalence Between Semantic Security and Indistinguishability Against Chosen Ciphertext Attacks
Improved, Black-Box, Non-Malleable Encryption from Semantic Security
Symmetric Encryption: Modes of Operation, Semantic Security
Indistinguishable Encryptions •Concrete Vs Asymptotic Security • Negligible Functions • Probabilistic Polynomial Time Algorithm
Efficient Cryptosystems from 2K-Th Power Residue Symbols
On the Security of the Elgamal Encryption Scheme and Damgård's
Twenty Years of Attacks on the RSA Cryptosystem 1 Introduction
Security Analysis of Elgamal Implementations
Lecture 8 1 Some More Security Definitions for Encryption Schemes
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication⋆
The Diffie-Hellman Problem and Cryptographic Applications
Proofs in Cryptography∗
Public-Key Encryption
Fully Homomorphic Encryption Using Ideal Lattices
Practical Chosen Ciphertext Secure Encryption from Factoring
Semantic Security Under Related-Key Attacks and Applications
Randomness-Dependent Message Security
Great Papers in Computer Security
Introduction
On Provable Security of Cryptographic Schemes
Generic Semantic Security Against a Kleptographic Adversary
Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security 929
Identity-Based Encryption from the Weil Pairing
Encrypted LQG Using Labeled Homomorphic Encryption
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Security of Symmetric Encryption Schemes
Literature Survey on Elliptic Curve Encryption Techniques
Performance Analysis of Goldwasser-Micali Cryptosystem
LNCS 3357, Pp
Immunizing Encryption Schemes from Decryption Errors