Parallel decryption queries in bounded chosen ciphertext attacks
From MaRDI portal
Recommendations
Cited in
(8)- Bounded CCA2-Secure Encryption
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Detecting dangerous queries: a new approach for chosen ciphertext security
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Counting Keys in Parallel After a Side Channel Attack
- Towards a Separation of Semantic and CCA Security for Public Key Encryption
- Indistinguishability against chosen ciphertext verification attack revisited: the complete picture
- Ciphertext-only attack on \(d\times d\) Hill in \(O(d 13^d)\)
This page was built for publication: Parallel decryption queries in bounded chosen ciphertext attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084351)