Skip to search formSkip to main contentSkip to account menu

Chosen-ciphertext attack

Known as: Indifferent chosen-ciphertext attack, CCA, Chosen ciphertext attack 
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The use of mathematical models in describing the dynamics of circadian clock in the plant Arabidopsis thaliana is gaining… 
2010
2010
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption… 
2008
2008
In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several… 
2007
2007
The circadian clock is an endogenous mechanism that generates rhythms with an approximately 24-h period and enables plants to… 
2005
2005
We propose a chosen-ciphertext attack on recently presented noncommutative variant of the well-known Polly Cracker cryptosystem… 
2004
2004
At Indocrypt’2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures… 
2002
2002
The Zheng-Seberry (ZS) encryption scheme was published in 1993 and was one of the first practical schemes that was considered… 
Highly Cited
1992
Highly Cited
1992
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…