Tag: semantic-security

Found 42 results for 'semantic-security'.

1) rsa - Is semantic security important in a hybrid cryptosystem?
2) key-exchange - Constructing secure key exchange protocol
3) random-number-generator - Is SHA-1 secure when used to implement a PRNG
4) provable-security - Easy explanation of "IND-" security notions?
5) public-key - Is there a public key semantically secure cryptosystem for which one can prove in zero knowledge the equivalence of two plaintexts?
6) diffie-hellman - Decisional Diffie-Hellman: compute Legendre symbol of $g^{ab}$ from $g^a$ and $g^b$?
7) provable-security - Perfect Secrecy -> One Time Semantic Security -> Secure PRG
8) homomorphic-encryption - Homomorphic Encryption and Semantic Security using Lattices?
9) cryptanalysis - Secure blinding factor switching at malicious server-side (Switching in One Time pad)
10) chosen-ciphertext-attack - Semantic Security Active or Passive attacks?
11) stream-cipher - Semantic Security Game
12) one-time-pad - Proving the semantic security of the One Time pad
13) encryption - Is $E′(k,m)=E(0^n,m)$ semantically secure?
14) encryption - Are there any security drawbacks for simply encrypting and MACing my JWS token (JWT)?
15) algorithm-design - Nonce-misuse-resistance scheme applied after the fact to AES-GCM for defense in depth?
16) pseudo-random-generator - Proof that pseudo-random generated key is semantically secure
17) rsa - semantic security of RSA variant
18) public-key - Security of semantically secure ciphers when the attacker knows the relation between plaintexts
19) semantic-security - Can semantic security protect against key recovery attack?
20) public-key - Semantic Security and Equal Message Length in the Context of Public Key Cryptography
21) encryption - Can a shift cipher attain perfect secrecy?
22) public-key - Indistinguishability versus semantic security?
23) public-key - What does the "Type 1 query" model on Miles, Sahai, and Zhandry's paper?
24) modes-of-operation - Does not using padding mean a lack of security?
25) zero-knowledge-proofs - What does "simulatable" mean in security proofs?
26) rsa - Homemade Randomized RSA
27) diffie-hellman - Decisional Diffie-Hellman: compute Legendre symbol of $g^{ab}$ from $g^a$ and $g^b$?
28) block-cipher - How secret key is sent in cipher-texts?
29) provable-security - Proof that IND$-CPA implies IND-CPA?
30) encryption - Does adding OWF of the private key to encryption scheme hurts security?
31) encryption - Leak Information?
32) encryption - Why isn't E' secure if it's built over a secure cipher?
33) initialization-vector - Is the tag generated in MAC equal for equal messages in CBC-MAC?
34) protocol-design - A question about fully homomorphic encryption (FHE)
35) provable-security - Easy explanation of "IND-" security notions?
36) cryptanalysis - Can I build a secure tweakable block cipher from a normal one by adding key and tweak?
37) semantic-security - Adversarial Indistinguishability with more messages
38) provable-security - Are there different definitions of secure two-party computation?
39) encryption - Security definition for IND-CPA of public key encryption
40) provable-security - Easy explanation of "IND-" security notions?
41) provable-security - Question on Simulation based security proof for Oblivious Transfer (OT) against semi-honest adversaries
42) security-definition - What is the definition of semantic secure advantage?