A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts ofâ€¦Â (More)

(More)

Semantic Scholar uses AI to extract papers important to this topic.

2012

2012

- Zongyang Zhang, Zhenfu Cao, Haifeng Qian
- Security and Communication Networks
- 2012

We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationallyâ€¦Â (More)

Is this relevant?

2005

2005

The stream cipher Self-Synchronizing Sober (SSS) is a candidate in the ECRYPT stream cipher competition. In this paper, weâ€¦Â (More)

Is this relevant?

2005

2005

- Stanislav Bulygin
- ArXiv
- 2005

1 Noncommutative Polly Cracker and preliminaries from noncommutative algebra The noncommutative Polly Cracker cryptosystems wereâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- James Manger
- CRYPTO
- 2001

An adaptive chosen ciphertext attack against PKCS #1 v2.0 RSA OAEP encryption is described. It recovers the plaintext â€“ not theâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- Victor Shoup
- EUROCRYPT
- 2000

The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure againstâ€¦Â (More)

Is this relevant?

2000

2000

- Ã‰liane Jaulmes, Antoine Joux
- CRYPTO
- 2000

We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomialâ€¦Â (More)

Is this relevant?

2000

2000

- Jonathan Katz, Bruce Schneier
- USENIX Security Symposium
- 2000

Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality andâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- Victor Shoup, Rosario Gennaro
- Journal of Cryptology
- 1998

For the most compelling applications of threshold cryptosystems, security against chosen cipher text attack is a requirementâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- Daniel Bleichenbacher
- CRYPTO
- 1998

This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA privateâ€¦Â (More)

Is this relevant?

1998

1998

- Victor Shoup, Rosario Gennaro, Almaden Austin, Beijing Haifa, T. J. Watson, Tokyo Zurich
- 1998

LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted ifâ€¦Â (More)

Is this relevant?