Chosen-ciphertext attack

Known as: Indifferent chosen-ciphertext attack, Chosen ciphertext attack, CCA-1 
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2017
05101519882017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally… (More)
Is this relevant?
2005
2005
The stream cipher Self-Synchronizing Sober (SSS) is a candidate in the ECRYPT stream cipher competition. In this paper, we… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
1 Noncommutative Polly Cracker and preliminaries from noncommutative algebra The noncommutative Polly Cracker cryptosystems were… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
An adaptive chosen ciphertext attack against PKCS #1 v2.0 RSA OAEP encryption is described. It recovers the plaintext – not the… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against… (More)
Is this relevant?
2000
2000
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial… (More)
Is this relevant?
2000
2000
Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality and… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
For the most compelling applications of threshold cryptosystems, security against chosen cipher text attack is a requirement… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA private… (More)
  • figure 1
  • figure 2
Is this relevant?
1998
1998
LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if… (More)
Is this relevant?