A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is `application/pdf`

.

## Filters

##
###
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation
[chapter]

2002
*
Lecture Notes in Computer Science
*

We describe an

doi:10.1007/3-540-45664-3_18
fatcat:hg4xdmuhd5e5rhq3eevlv7kzru
*adaptive**chosen*-*ciphertext**attack*on a smart card implementation of the RSA decryption algorithm in the presence of side-channel information leakage. ... We have shown how an adversary could use very few bits of information in an*adaptive**chosen*-*ciphertext**attack*. ... We show that an adversary can use the information about the algorithm's execution path in the*adaptive**chosen*-*ciphertext**attack*. ...##
###
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems
[chapter]

2004
*
Lecture Notes in Computer Science
*

Recently Canetti, Krawczyk and Nielsen defined the notion of replayable

doi:10.1007/978-3-540-24638-1_9
fatcat:rqwdddbzovb3tf5bmeaewckuxi
*adaptive**chosen**ciphertext**attack*(RCCA) secure encryption. ... By this, we mean that anybody can convert a*ciphertext*y with plaintext m into a different*ciphertext*y that is distributed identically to a fresh encryption of m. ... Introduction Security against*adaptive**chosen**ciphertext**attacks*(CCA2) has become the golden security standard for public-key cryptosystems. ...##
###
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
[article]

2019
*
arXiv
*
pre-print

Rather, our results mean that, if these cryptosystems are exposed to

arXiv:1808.09655v2
fatcat:hns3v7hetvayddrnluw2nugm7q
*chosen*-*ciphertext**attacks*(e.g., as a result of deployment in an inappropriate real-world setting) then quantum*attacks*are even more ... ., post-quantum*chosen*-plaintext secrecy). ... [BJ15; GHS16] , and encryption secure against both quantum chosenplaintext and*adaptive*quantum*chosen*-*ciphertext**attacks*(QCCA2) [BZ13b] . ...##
###
Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece Public-Key Cryptosystem
[chapter]

2002
*
Information, Coding and Mathematics
*

##
###
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
[chapter]

2009
*
Lecture Notes in Computer Science
*

However, they left as an open problem that of designing an encryption scheme that simultaneously provides security against both key dependent

doi:10.1007/978-3-642-01001-9_20
fatcat:mn4ibpbanzcprc6w5z5o3a2inm
*chosen*plaintext and*adaptive**chosen**ciphertext**attack*(KDM-CCA2 ... However, Boneh et al. left as an open problem the construction of an encryption scheme that is simultaneously secure against key dependent*chosen*plaintext and*chosen**ciphertext**attack*(KDM-CCA2). ... [5] to the notion of security against*chosen**ciphertext**attack*( [30, 31, 15] ). ...##
###
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
[chapter]

2002
*
Lecture Notes in Computer Science
*

security even against

doi:10.1007/3-540-36288-6_8
fatcat:upje6ra2ufertn37yowfx2u4ma
*chosen*plaintext*attacks*. ... We construct the first*adaptive**chosen**ciphertext*(CCA2) secure public key Broadcast Encryption Scheme under the DDH assumption (with no random oracles). ... z-resilient against*chosen**ciphertext**attacks*. ...##
###
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
[chapter]

2006
*
Lecture Notes in Computer Science
*

Our constructions feature truly constant-size decryption keys whereas the lengths of both the encryption key and

doi:10.1007/11605805_16
fatcat:4azki6re6zh7pce23tfcvogv3m
*ciphertext*are independent of group size. ... We do not explicitly consider non-*adaptive**chosen**ciphertext**attack*(CCA1). ... Rackoff and Simon later [46] improved this construction to be secure against*adaptive**chosen**ciphertext**attack*(CCA2). ...##
###
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
[chapter]

2002
*
Lecture Notes in Computer Science
*

We propose an efficient two-party public key cryptosystem that is secure against

doi:10.1007/3-540-36288-6_4
fatcat:bd62denbozg75kmxa6xrknh5yu
*adaptive**chosen**ciphertext**attack*, based on the hardness of Decision Diffie-Hellman (DDH). ... Previous results on efficient threshold cryptosystems secure against*adaptive**chosen**ciphertext**attack*required either (1) a strict majority of uncorrupted decryption servers, and thus do not apply to ... There have been previous proposals for threshold cryptosystems secure against*adaptive**chosen**ciphertext**attack*, namely, Shoup and Gennaro [42] , Canetti and Goldwasser [10] , Abe [1] , Jarecki and ...##
###
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
[chapter]

1998
*
Lecture Notes in Computer Science
*

The scheme is quite practical, and is provably secure against

doi:10.1007/bfb0055717
fatcat:bx3mcfgpvvgrhf57wj2sg3r6ou
*adaptive**chosen**ciphertext**attack*under standard intractability assumptions. ...*adaptive**chosen**ciphertext**attack*. ... Thus, with just a bit more computation, we get security against*adaptive**chosen**ciphertext**attack*, whereas the basic El Gamal scheme is completely insecure against*adaptive**chosen**ciphertext**attack*. ...##
###
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
[chapter]

1999
*
Lecture Notes in Computer Science
*

This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against

doi:10.1007/3-540-48910-x_7
fatcat:psosdgik2ffchjhkq2b4opp7ai
*adaptive**chosen**ciphertext**attack*, under the Decisional Diffie-Hellman (DDH) intractability assumption. ... Previously, it was shown how to design non-interactive threshold PKC secure under*chosen**ciphertext**attack*, in the random-oracle model and under the DDH intractability assumption [25] . ... Stronger notions of security of centralized encryption schemes, namely security against 'Lunch-time*Attacks*' and '*chosen**ciphertext**attacks*' (CCA) were defined, constructed, and studied in [33, 38, 19 ...##
###
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
[chapter]

2003
*
Lecture Notes in Computer Science
*

We propose a new public key trace and revoke scheme secure against

doi:10.1007/978-3-540-40061-5_23
fatcat:w3hefl7hqrc2xj2nafokytfafi
*adaptive**chosen**ciphertext**attack*. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. Fazio [9] . ... In addition, our scheme is secure against*adaptive**chosen**ciphertext**attack*under only the decision Diffie-Hellman (DDH) assumption and the collision-resistant hash function H assumption, whereas the DF ... Security against*adaptive**chosen**ciphertext**attack*An adversary A in an*adaptive**chosen**ciphertext**attack*(CCA2) is a probabilistic, poly-time oracle query machine. ...##
###
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack

2003
*
SIAM journal on computing (Print)
*

The scheme and its variants are quite practical, and are proved secure against

doi:10.1137/s0097539702403773
fatcat:gnx4j7stunhx5ejl7fbdyfrj3i
*adaptive**chosen**ciphertext**attack*under standard intractability assumptions. ... This paper is a significantly revised and extended version of the extended abstract "A practical public key cryptosystem provably secure against*adaptive**chosen**ciphertext**attack*" [R. Cramer and V. ... insecure against*adaptive**chosen**ciphertext**attack*. ...##
###
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
[chapter]

2001
*
Lecture Notes in Computer Science
*

This paper presents a new type of powerful cryptanalytic

doi:10.1007/3-540-45325-3_11
fatcat:k4vlq5w4dbgixgte4unuknx3my
*attacks*on public-key cryptosystems, extending the more commonly studied*adaptive**chosen*-*ciphertext**attacks*. ... In the new*attacks*, an adversary is not only allowed to submit to a decryption oracle (valid or invalid)*ciphertexts*of her choice, but also to emit a "dump query" prior to the completion of a decryption ... Definition 2 (Strong [Static/*Adaptive*]*Chosen*-*Ciphertext**Attack*). A strong static*chosen*-*ciphertext**attack*consists of the following scenario: 1. ...##
###
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
[article]

2014
pre-print

Keywords - Timing

doi:10.13140/rg.2.1.1699.4800
arXiv:1409.6556v1
fatcat:petq4rnohnenxehaabubqrcc3m
*Attack*, Random Oracle Model, Indistinguishabilit,*Chosen*Plaintext*Attack*, CPA,*Chosen**Ciphertext**Attack*, IND-CCA1,*Adaptive**Chosen**Ciphertext**Attack*, IND-CCA2, Trivial File Transfer ... We have introduced a novel adversary model in*Chosen*-*Ciphertext**Attack*with Timing*Attack*(CCA2-TA) and it was a practical model because the model incorporates the timing*attack*. ... We add the timing-*attack*in an*Adaptive**Chosen**Ciphertext**Attacks*(CCA2) model. B. ...##
###
Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks
[chapter]

*
Advances in Cryptology — CRYPTO' 92
*

In an

doi:10.1007/3-540-48071-4_20
dblp:conf/crypto/ZhengS92
fatcat:ynips7jm3jdk5d2o3gqea7xvp4
*adaptively**chosen**ciphertext**attack*, an*attacker*can query the deciphering algorithm with any*ciphertexts*, ezcept for t h e exact object*ciphertext*to becryptanalyzed. ... This paper presents three mcthods for strengthening public key cryptosystems in such a way t,hat they become secure against adaptiuely*chosen**ciphertext**attacks*. ... application where*adaptively**chosen**ciphertext**attacks*would b e a considerable threat. ...
« Previous

*Showing results 1 — 15 out of 9,751 results*