Skip to search formSkip to main contentSkip to account menu

Chosen-ciphertext attack

Known as: Indifferent chosen-ciphertext attack, CCA, Chosen ciphertext attack 
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In this paper, we propose an efficient fine-grained access control system for secure Personal Health Records (PHRs) in cloud… 
2010
2010
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption… 
2007
2007
The circadian clock is an endogenous mechanism that generates rhythms with an approximately 24-h period and enables plants to… 
2005
2005
We propose a chosen-ciphertext attack on recently presented noncommutative variant of the well-known Polly Cracker cryptosystem… 
2004
2004
At Indocrypt’2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures… 
2002
2002
The Zheng-Seberry (ZS) encryption scheme was published in 1993 and was one of the first practical schemes that was considered… 
Review
2002
Review
2002
In this paper we discuss the security of digital signature schemes based on error-- correcting codes. Several attacks to the… 
Highly Cited
1992
Highly Cited
1992
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…