Found 38 results for 'deterministic-encryption'.
1) random-number-generator - PRNG determinism?
2) authenticated-encryption - Why is synthetic IV (SIV) mode considered deterministic authenticated encryption (DAE)?
3) hmac - Using HMAC as a nonce with AES-CTR encrypt-and-MAC
4) provable-security - Not understanding deterministic authenticated encryption (DAE) security definition
5) hmac - Security of this deterministic encryption scheme
6) initialization-vector - Deterministic Encryption with AES GCM - how to choose the IV (nonce)
7) authenticated-encryption - What is Deterministic Authenticated Encryption?
8) paillier - Weakening of Paillier cryptosystem due to ciphertext equivalence and order in CryptDB
9) aes - Deterministic Encryption using AES
10) rsa - Pseudonymization hashing using public key
11) algorithm-design - Deterministic Authenticated Encryption with AES-OFB and HMAC
12) aes - (Re-)Using deterministic IV in CTR mode / How to: deterministic AES
13) hash - Does SIV mode work for asymmetric encryption?
14) encryption - Security of Deterministic Encryption Scheme
15) authenticated-encryption - one-pass deterministic authenticated encryption
16) modes-of-operation - Is this method of deterministically using CBC secure?
17) public-key - Share secret non-interactively in a verifiable way
18) security-definition - Does encryption using PRP mean indistinguishable encryption against an eavesdropper?
19) symmetric - Deterministic symmetric indistinguishable encryption
20) collision-resistance - Is there a deterministic one-way collision-free crypto algorithm?
21) secret-sharing - Do deterministic secret sharing schemes exist?
22) public-key - Public-Key Deterministic Encryption : Why does not provide perfect security?
23) encryption - Encrypt user email but be able to find user by email
24) terminology - What is the meaning of "probabilistic encryption algorithm"?
25) rsa - Why does adding PKCS#1 v1.5 padding make RSA encryption non-deterministic?
26) database - Is this a valid "fix" for deterministic encryption in encrypted databases?
27) encryption - Search Over Encrypted Data
28) rsa - How to recover small messages from textbook RSA?
29) encryption - Are there any deterministic multi-block encryption constructions that have an avalanche effect going both ways?
30) aes - AES in CTR mode, with a single key, and an IV derived from the plaintext
31) encryption - Deterministic data masking
32) rsa - How can a system be non-deterministic?
33) encryption - Katz/Lindell Problem 2.2
34) encryption - CPA security of a stateless and deterministic encryption system
35) elliptic-curves - Deterministic Key using a seed for ECNamedCurve
36) symmetric - Are there deterministic private-key encryption schemes that are CPA-secure?
37) one-way-function - Do probabilistic one-way functions imply deterministic one-way functions?
38) pseudo-random-permutation - What is the best way to pseudonymise IP addresses while retaining the ability to identify those that share a subnet?