Skip to search formSkip to main contentSkip to account menu

Chosen-ciphertext attack

Known as: Indifferent chosen-ciphertext attack, CCA, Chosen ciphertext attack 
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Revocable identity-based encryption (RIBE) is an extension of IBE which can support a key revocation mechanism, and it is… 
2013
2013
The use of mathematical models in describing the dynamics of circadian clock in the plant Arabidopsis thaliana is gaining… 
2012
2012
To improve the network security by a cryptographic primitive called proxy re-encryption in which a proxy can transform a… 
2010
2010
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption… 
2008
2008
In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several… 
2007
2007
The circadian clock is an endogenous mechanism that generates rhythms with an approximately 24-h period and enables plants to… 
2004
2004
At Indocrypt’2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures… 
1998
1998
LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if… 
Highly Cited
1992
Highly Cited
1992
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…