Sciweavers

135 search results - page 2 / 27
» Adaptive Security of Symbolic Encryption
Sort
View
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
EUROCRYPT
2009
Springer
14 years 8 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
14 years 1 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
ICIP
2004
IEEE
14 years 9 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
ACISP
2010
Springer
13 years 9 months ago
Adaptive and Composable Non-committing Encryptions
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Koui...