Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Adaptive chosen-ciphertext attack

Known as: Acca, Chosen, Adaptive-chosen-ciphertext attack 
An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can… Expand
Is this relevant?
2009
2009
The paper ldquosecure arithmetic codingrdquo (in IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 2263-2272, May 2007… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the long-standing open problem of "circular… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We propose a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based… Expand
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
  • Roman Novak
  • Public Key Cryptography
  • 2002
  • Corpus ID: 15408784
We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presence… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA private… Expand
  • figure 1
  • figure 2
Is this relevant?