Academic literature on the topic 'Chosen ciphertext attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Chosen ciphertext attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Chosen ciphertext attack"
Hashimoto, Yasufumi. "Chosen ciphertext attack on ZHFE." JSIAM Letters 9 (2017): 21–24. http://dx.doi.org/10.14495/jsiaml.9.21.
Full textRavi, Prasanna, Thales Paiva, Dirmanto Jap, Jan-Pieter D’Anvers, and Shivam Bhasin. "Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 795–818. http://dx.doi.org/10.46586/tches.v2024.i2.795-818.
Full textZhu, Huijun, Dong Xie, Haseeb Ahmad, and Hasan Naji Hasan Abdullah. "New constructions of equality test scheme for cloud-assisted wireless sensor networks." PLOS ONE 16, no. 10 (2021): e0258746. http://dx.doi.org/10.1371/journal.pone.0258746.
Full textMike, Hamburg, Hermelink Julius, Primas Robert, et al. "Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber." IACR Transactions on Cryptographic Hardware and Embedded Systems 2021, no. 4 (2021): 8–113. https://doi.org/10.46586/tches.v2021.i4.88-113.
Full textShoup, Victor, and Rosario Gennaro. "Securing Threshold Cryptosystems against Chosen Ciphertext Attack." Journal of Cryptology 15, no. 2 (2002): 75–96. http://dx.doi.org/10.1007/s00145-001-0020-9.
Full textJiantao Zhou, O. C. Au, and P. H. W. Wong. "Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding." IEEE Transactions on Signal Processing 57, no. 5 (2009): 1825–38. http://dx.doi.org/10.1109/tsp.2009.2013901.
Full textLong, Yu, and Kefei Chen. "Certificateless threshold cryptosystem secure against chosen-ciphertext attack." Information Sciences 177, no. 24 (2007): 5620–37. http://dx.doi.org/10.1016/j.ins.2007.06.014.
Full textKhairunas, Muhammad Zarlis, and Sawaluddin. "Data Security Analysis Against Chosen Ciphertext Secure Public Key Attack Using Threshold Encryption Scheme." Randwick International of Social Science Journal 2, no. 3 (2021): 326–34. http://dx.doi.org/10.47175/rissj.v2i3.275.
Full textChunbo, Ma, Ao Jun, and Li Jianhua. "Broadcast group-oriented encryption secure against chosen ciphertext attack." Journal of Systems Engineering and Electronics 18, no. 4 (2007): 811–17. http://dx.doi.org/10.1016/s1004-4132(08)60025-0.
Full textSikdar, Subinoy, Sagnik Dutta, and Malay Kule. "On Cryptanalysis of 3-DES using Nature-Inspired Algorithms." International Journal of Computer Network and Information Security 17, no. 3 (2025): 54–71. https://doi.org/10.5815/ijcnis.2025.03.04.
Full textDissertations / Theses on the topic "Chosen ciphertext attack"
St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Full textRangasamy, Jothi Ramalingam. "Cryptographic techniques for managing computational effort." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf.
Full textChang, Chi-Hao, and 張起豪. "The Research and Implementation of Chosen Ciphertext Attacks." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/89766980559250754325.
Full textBook chapters on the topic "Chosen ciphertext attack"
Biryukov, Alex. "Chosen Ciphertext Attack." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_556.
Full textBiryukov, Alex. "Chosen Ciphertext Attack." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_556.
Full textBiryukov, Alex. "Adaptive Chosen Ciphertext Attack." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_543.
Full textBiryukov, Alex. "Adaptive Chosen Ciphertext Attack." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_543.
Full textBiryukov, Alex. "Chosen Plaintext and Chosen Ciphertext Attack." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_558.
Full textBiryukov, Alex. "Chosen Plaintext and Chosen Ciphertext Attack." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_558.
Full textBiryukov, Alex. "Adaptive Chosen Plaintext and Chosen Ciphertext Attack." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_544.
Full textBiryukov, Alex. "Adaptive Chosen Plaintext and Chosen Ciphertext Attack." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_544.
Full textGalil, Zvi, S. Haber, and Moti Yung. "Security against replay chosen-ciphertext attack." In DIMACS Series in Discrete Mathematics and Theoretical Computer Science. American Mathematical Society, 1991. http://dx.doi.org/10.1090/dimacs/002/12.
Full textJaulmes, Éliane, and Antoine Joux. "A Chosen-Ciphertext Attack against NTRU." In Advances in Cryptology — CRYPTO 2000. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_2.
Full textConference papers on the topic "Chosen ciphertext attack"
Lin, Zhuosheng, Simin Yu, and Jinhu Lii. "Chosen ciphertext attack on a chaotic stream cipher." In 2018 Chinese Control And Decision Conference (CCDC). IEEE, 2018. http://dx.doi.org/10.1109/ccdc.2018.8408069.
Full textWeng, Jian, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, and Junzuo Lai. "Conditional proxy re-encryption secure against chosen-ciphertext attack." In the 4th International Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533100.
Full textQi, Zhifeng, Sihan Qing, Yixian Yang, and Guanghui Cheng. "A Novel Hybrid Encryption Scheme against Adaptive Chosen Ciphertext Attack." In 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007). IEEE, 2007. http://dx.doi.org/10.1109/cisw.2007.4425619.
Full textGao, Chong-zhi, Dongqing Xie, Jin Li, Baodian Wei, and Haibo Tian. "Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack." In 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.88.
Full textJing Ren and Ying Gao. "A fully secure identity-based encryption scheme against chosen-ciphertext attack." In ICINS 2014 - 2014 International Conference on Information and Network Security. Institution of Engineering and Technology, 2014. http://dx.doi.org/10.1049/cp.2014.1269.
Full textHuang, Huawei, Chunhua Li, and Ruwei Chen. "A New Public-Key Encryption Scheme Secure against Adaptive Chosen Ciphertext Attack." In 2009 First International Conference on Information Science and Engineering. IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.102.
Full textKapusta, Katarzyna, Han Qiu, and Gerard Memmi. "Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments." In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, 2019. http://dx.doi.org/10.1109/cscloud/edgecom.2019.00011.
Full textNaor, M., and M. Yung. "Public-key cryptosystems provably secure against chosen ciphertext attacks." In the twenty-second annual ACM symposium. ACM Press, 1990. http://dx.doi.org/10.1145/100216.100273.
Full textCarvalho, Gabriel C. de, and Luis A. B. Kowada. "The First Biclique Cryptanalysis of Serpent-256." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19225.
Full textHillmann, Peter. "Lightweight Public Key Encryption in Post-Quantum Computing Era." In 3rd International Conference on Cryptography and Blockchain. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.132101.
Full text