Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,370,508 papers from all fields of science
Search
Sign In
Create Free Account
Adaptive chosen-ciphertext attack
Known as:
Acca
, Chosen
, Adaptive-chosen-ciphertext attack
Expand
An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Attack model
Chosen-ciphertext attack
Ciphertext
Ciphertext indistinguishability
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
M. Isa
,
H. Hashim
arXiv.org
2014
Corpus ID: 11807689
We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model…
Expand
2013
2013
Intelligence and Human Progress: The Story of What was Hidden in our Genes
J. Flynn
2013
Corpus ID: 150218950
Written by James R. Flynn of the "Flynn effect" (the sustained and substantial increase in intelligence test scores across the…
Expand
2012
2012
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring
Xianhui Lu
,
Bao Li
,
Qixiang Mei
,
Yamin Liu
Information Security Practice and Experience
2012
Corpus ID: 3117150
We propose a new variant of HK09 (proposed by Hofheinz and Kiltz in Eurocrypt 2009) which improves the decapsulation efficiency…
Expand
2011
2011
Adaptive Chosen Ciphertext Attack
A. Biryukov
Encyclopedia of Cryptography and Security
2011
Corpus ID: 264245625
2009
2009
Accounting for intangibles: financial reporting and value creation in the knowledge economy
Ricardo Blaug
,
R. Lekhi
2009
Corpus ID: 18719654
A new report from The Work Foundation highlights the urgent need for UK organisations to adopt a more comprehensive and…
Expand
2007
2007
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
J. Birkett
,
A. Dent
,
G. Neven
,
Jacob C. N. Schuldt
Australasian Conference on Information Security…
2007
Corpus ID: 7930808
We propose new instantiations of chosen-ciphertext secure of identity-based encryption schemes with wildcards (WIBE). Our schemes…
Expand
2005
2005
Adaptive Chosen Ciphertext Attack
A. Biryukov
Encyclopedia of Cryptography and Security
2005
Corpus ID: 19331530
2004
2004
EFEITO DO AIB E DE DIFERENTES TIPOS DE ESTACA NA PROPAGAÇÃO VEGETATIVA DA GOIABEIRA-SERRANA (Acca sellowiana Berg)
R. C. Franzon
,
M. D. C. Raseira
,
L. Antunes
2004
Corpus ID: 94439417
O trabalho foi realizado na Embrapa Clima Temperado, Pelotas, RS, com o objetivo de verificar o efeito do AIB no enraizamento de…
Expand
2002
2002
ECIES-KEM vs. PSEC-KEM
A. Dent
2002
Corpus ID: 14227861
The purpose of this paper is to discuss the similarities and differences between the PSEC-KEM and ECIES-KEM. The schemes are in…
Expand
2000
2000
An Adaptive Chosen Ciphertext Attack on a Variation of the Cramer-shoup Public-key Encryption Scheme
B. Preneel
2000
Corpus ID: 17509106
In this letter we show that the variation of the Cramer-Shoup public-key encryption scheme as introduced in 1] is not secure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE