Adaptive chosen-ciphertext attack

Known as: Adaptive chosen ciphertext attack, Adaptive-chosen-ciphertext attack, CCA-2 
An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2017
0102019972017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The deniably information-hiding encryption (DIHE) is a type of deniable encryption which can hide an additional information in… (More)
Is this relevant?
2009
2009
The paper ldquosecure arithmetic codingrdquo (in IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 2263-2272, May 2007… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2004
2004
Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secure… (More)
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the capability of traitor tracing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
We propose an efficient two-party public key cryptosystem that is secure against adaptive chosen ciphertext attack, based on the… (More)
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presence… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite… (More)
  • figure 1
  • figure 4
  • figure 8
Is this relevant?
2000
2000
In this letter we show that the variation of the Cramer-Shoup public-key encryption scheme as introduced in 1] is not secure… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
1 I n t r o d u c t i o n In this paper, we present and analyze a new public key cryptosystem that is provably secure against… (More)
Is this relevant?