Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,876,464 papers from all fields of science
Search
Sign In
Create Free Account
Chosen-ciphertext attack
Known as:
Indifferent chosen-ciphertext attack
, CCA
, Chosen ciphertext attack
Expand
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the plaintexts of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Adaptive chosen-ciphertext attack
Attack model
Authenticated encryption
Cipher security summary
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Generic Constructions of RIBE via Subset Difference Method
Xuecheng Ma
,
D. Lin
IACR Cryptology ePrint Archive
2019
Corpus ID: 208542593
Revocable identity-based encryption (RIBE) is an extension of IBE which can support a key revocation mechanism, and it is…
Expand
2016
2016
An IBE Technique Using Partial Discrete Logarithm
C. Meshram
,
P. Powar
,
M. Obaidat
,
Cheng-Chi Lee
2016
Corpus ID: 64264715
2013
2013
System identification of circadian clock in plant Arabidopsis thaliana
Mathias Foo
,
Hee Young Yoo
,
Pan-Jun Kim
International Conference on Control, Automation…
2013
Corpus ID: 18574362
The use of mathematical models in describing the dynamics of circadian clock in the plant Arabidopsis thaliana is gaining…
Expand
2012
2012
A secure data transfer mechanism using single-handed re-encryption technique
R. Sumathi
,
E. Kirubakaran
,
M. Thangavel
International Conference on Emerging Trends in…
2012
Corpus ID: 27503037
To improve the network security by a cryptographic primitive called proxy re-encryption in which a proxy can transform a…
Expand
2010
2010
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Liming Fang
,
W. Susilo
,
Yongjun Ren
,
Chunpeng Ge
,
Jiandong Wang
J. Digit. Content Technol. its Appl.
2010
Corpus ID: 17331791
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption…
Expand
2008
2008
Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
T. Rai
,
S. Bulygin
IACR Cryptology ePrint Archive
2008
Corpus ID: 6303001
In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several…
Expand
2007
2007
CIRCADIAN CLOCK ASSOCIATED 1 Transcript Stability and the Entrainment of the Circadian Clock in Arabidopsis 1 [ W ] [ OA ]
Esther Yakir
,
Dror Hilman
,
M. Hassidim
,
R. Green
2007
Corpus ID: 27084926
The circadian clock is an endogenous mechanism that generates rhythms with an approximately 24-h period and enables plants to…
Expand
2004
2004
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers
Bin Zhang
,
Hongjun Wu
,
D. Feng
,
F. Bao
International Conference on Cryptology in India
2004
Corpus ID: 14906890
At Indocrypt’2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures…
Expand
1998
1998
Research Report Why Chosen Ciphertext Security Matters Why Chosen Ciphertext Security Matters
V. Shoup
1998
Corpus ID: 16998290
LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if…
Expand
Highly Cited
1992
Highly Cited
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
Yuliang Zheng
,
J. Seberry
Annual International Cryptology Conference
1992
Corpus ID: 12825077
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE