Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Chosen-ciphertext attack
Known as:
Indifferent chosen-ciphertext attack
, CCA
, Chosen ciphertext attack
Expand
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Adaptive chosen-ciphertext attack
Attack model
Authenticated encryption
Cipher security summary
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357]
W. Yap
,
R. Phan
Applied Soft Computing
2017
Corpus ID: 41391309
2016
2016
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
Kai He
,
J. Weng
,
Joseph K. Liu
,
Wanlei Zhou
,
Jia-Nan Liu
International Conference on Network and System…
2016
Corpus ID: 1287939
In this paper, we propose an efficient fine-grained access control system for secure Personal Health Records (PHRs) in cloud…
Expand
2010
2010
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Liming Fang
,
W. Susilo
,
Yongjun Ren
,
Chunpeng Ge
,
Jiandong Wang
J. Digit. Content Technol. its Appl.
2010
Corpus ID: 17331791
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption…
Expand
2009
2009
An efficient and provable secure identity-based ring signcryption scheme
Zhenchao Zhu
,
Yuqing Zhang
,
Fengjiao Wang
Comput. Stand. Interfaces
2009
Corpus ID: 35382347
2007
2007
CIRCADIAN CLOCK ASSOCIATED 1 Transcript Stability and the Entrainment of the Circadian Clock in Arabidopsis 1 [ W ] [ OA ]
E. Yakir
,
Dror Hilman
,
M. Hassidim
,
R. Green
2007
Corpus ID: 27084926
The circadian clock is an endogenous mechanism that generates rhythms with an approximately 24-h period and enables plants to…
Expand
2005
2005
Chosen-ciphertext attack on noncommutative Polly Cracker
S. Bulygin
arXiv.org
2005
Corpus ID: 5192206
We propose a chosen-ciphertext attack on recently presented noncommutative variant of the well-known Polly Cracker cryptosystem…
Expand
2004
2004
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers
Bin Zhang
,
Hongjun Wu
,
D. Feng
,
F. Bao
International Conference on Cryptology in India
2004
Corpus ID: 14906890
At Indocrypt’2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures…
Expand
2002
2002
The Analysis of Zheng-Seberry Scheme
David Soldera
,
J. Seberry
,
Chengxin Qu
Australasian Conference on Information Security…
2002
Corpus ID: 35768290
The Zheng-Seberry (ZS) encryption scheme was published in 1993 and was one of the first practical schemes that was considered…
Expand
Review
2002
Review
2002
Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece cryptosystem
E. Verheul
,
J. Doumen
,
V. Tilborg
2002
Corpus ID: 123270649
In this paper we discuss the security of digital signature schemes based on error-- correcting codes. Several attacks to the…
Expand
Highly Cited
1992
Highly Cited
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
Yuliang Zheng
,
J. Seberry
Annual International Cryptology Conference
1992
Corpus ID: 12825077
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE