An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number ofâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2012

2012

- Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian
- 2012 Fourth International Conference onâ€¦
- 2012

The deniably information-hiding encryption (DIHE) is a type of deniable encryption which can hide an additional information inâ€¦Â (More)

Is this relevant?

2009

2009

- Jiantao Zhou, Oscar C. Au, Peter Hon-Wah Wong
- IEEE Transactions on Signal Processing
- 2009

The paper ldquosecure arithmetic codingrdquo (in IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 2263-2272, May 2007â€¦Â (More)

Is this relevant?

2004

2004

- Jens Groth
- TCC
- 2004

Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secureâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Yevgeniy Dodis, Nelly Fazio
- Public Key Cryptography
- 2003

A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the capability of traitor tracingâ€¦Â (More)

Is this relevant?

2003

2003

- Philip D. MacKenzie
- Public Key Cryptography
- 2003

We propose an efficient two-party public key cryptosystem that is secure against adaptive chosen ciphertext attack, based on theâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- Roman Novak
- Public Key Cryptography
- 2002

We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presenceâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- Ronald Cramer, Victor Shoup
- SIAM J. Comput.
- 2001

A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quiteâ€¦Â (More)

Is this relevant?

2000

2000

An Adaptive Chosen Ciphertext Attack on a Variation of the Cramer-shoup Public-key Encryption Scheme

In this letter we show that the variation of the Cramer-Shoup public-key encryption scheme as introduced in 1] is not secureâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- Ran Canetti, Shafi Goldwasser
- EUROCRYPT
- 1999

This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attackâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- Ronald Cramer, Victor Shoup
- CRYPTO
- 1998

1 I n t r o d u c t i o n In this paper, we present and analyze a new public key cryptosystem that is provably secure againstâ€¦Â (More)

Is this relevant?