Search results
Jump to navigation
Jump to search
- ...listic encryption|probabilistic]] [[Public-key cryptography|public-key]] [[encryption]] scheme. ...which a primitive public-key encryption function is converted to a secure encryption scheme by use of a truly random hash function; the resulting scheme is desi ...3 KB (348 words) - 22:25, 27 February 2024
- ...and [[multipart/encrypted]] framework to apply [[digital signature]] and [[encryption]] services to [[MIME]] objects. ...lic key management approaches, including both ad hoc and certificate-based schemes. Mechanisms are provided to support many public key management approaches.< ...1 KB (167 words) - 17:13, 16 May 2025
- ...e]], that is, to hide even partial information about the [[plaintext]], an encryption algorithm must be [[randomized algorithm|probabilistic]]. ...ize. More efficient probabilistic encryption algorithms include [[ElGamal encryption|Elgamal]], [[Paillier]], and various constructions under the [[random oracl ...4 KB (612 words) - 19:08, 11 February 2025
- {{short description|IEEE standardization project for public-key cryptography}} ...lectrical and Electronics Engineers]] (IEEE) standardization project for [[public-key cryptography]]. It includes specifications for: ...6 KB (678 words) - 03:54, 31 July 2024
- ...ties ([[proxy server|proxies]]) to alter a [[ciphertext]] which has been [[encryption|encrypted]] for one party, so that it may be decrypted by another. ...l's Blog, Seen Nov 2014, http://mohamednabeel.blogspot.ca/2011/03/proxy-re-encryption.html</ref> ...6 KB (940 words) - 03:10, 24 January 2025
- ...ccache–Stern cryptosystem''' is a [[Homomorphic encryption|homomorphic]] [[public-key cryptosystem]] whose security rests on the [[higher residuosity problem]]. ...product of two large [[Prime number|primes]]. This scheme is [[Homomorphic encryption|homomorphic]] and hence [[Malleability (cryptography)|malleable]]. ...3 KB (506 words) - 17:50, 28 January 2023
- ...simultaneously performs the functions of both [[digital signature]] and [[encryption]]. ...ion overheads in comparison with the traditional signature-then-encryption schemes. ...7 KB (939 words) - 20:22, 28 January 2025
- '''Plaintext-awareness''' is a notion of security for [[public-key encryption]]. A [[cryptosystem]] is plaintext-aware if it is difficult for any effici ...view, this is a strange property. Normally, a ciphertext is computed by [[encryption|encrypting]] a plaintext. If a ciphertext is created this way, its creator ...4 KB (493 words) - 04:20, 5 July 2023
- ...ncryption algorithms include [[RSA (algorithm)|RSA]] cryptosystem (without encryption padding), and many [[block cipher]]s when used in [[electronic codebook|ECB ...ryptography]], where any party can encrypt chosen messages using a public encryption key. In this case, the adversary can build a large "dictionary" of useful ...7 KB (1,035 words) - 16:46, 18 June 2025
- ...ache]] and [[Jacques Stern]] in 1997. This cryptosystem is [[deterministic encryption|deterministic]], and hence is not [[semantic security|semantically secure]] ===Encryption=== ...4 KB (560 words) - 17:03, 1 June 2024
- {{Short description|Asymmetric key encryption algorithm}} ...n of being the first [[probabilistic encryption|probabilistic]] public-key encryption scheme which is [[provably secure]] under standard cryptographic assumption ...7 KB (1,037 words) - 18:47, 24 August 2023
- {{Short description|Asymmetric key encryption algorithm}} ...'''Cramer–Shoup system''' is an [[asymmetric cryptography|asymmetric]] key encryption algorithm, and was the first efficient scheme proven to be secure against a ...7 KB (1,041 words) - 17:33, 23 July 2024
- ...er ciphertext which decrypts to a related [[plaintext]]. That is, given an encryption of a plaintext <math>m</math>, it is possible to generate another ciphertex ...rning <math>m</math>. Such schemes are known as [[homomorphic encryption]] schemes. ...7 KB (988 words) - 18:50, 17 May 2025
- ...PE">{{cite conference |first=Josh |last=Benaloh |title=Dense Probabilistic Encryption. |conference=Workshop on Selected Areas of Cryptography |pages=120–128 |yea ...roduct of two large [[Prime number|primes]]. This scheme is [[Homomorphic encryption|homomorphic]] and hence [[Malleability (cryptography)|malleable]]. ...4 KB (713 words) - 11:00, 9 September 2020
- ...meeting, use of a trusted courier, or sending the key through an existing encryption channel. The first two are often impractical and unsafe, while the third d ...reates a key-pair, they keep one key private and the other, known as the ''public-key'', is uploaded to a server where it can be accessed by anyone to send the u ...3 KB (549 words) - 19:38, 9 January 2025
- {{Short description|Public-key cryptosystem}} ...he [[ElGamal signature scheme]], which should not be confused with ElGamal encryption. ...10 KB (1,498 words) - 01:36, 20 July 2025
- ...be used to roughly equate keys of other types of algorithms with symmetric encryption algorithms. In short, 128 bit symmetric keys are said to be equivalent to 3 * symmetric encryption algorithms such as 3DES and AES; ...5 KB (702 words) - 08:26, 3 April 2025
- ...ource and includes the extension functions module. Support for 256-bit AES encryption has been added in version 1.9.8. ...to select the encryption scheme at runtime. Currently, 7 different cipher schemes can be selected: ...4 KB (485 words) - 15:02, 4 June 2025
- '''NESSIE''' ('''New European Schemes for Signatures, Integrity and Encryption''') was a [[Europe]]an research project funded from 2000 to 2003 to identif *[[Advanced Encryption Standard|AES]]*: (Advanced Encryption Standard) ([[NIST]], [[Federal Information Processing Standard|FIPS]] Pub 1 ...5 KB (657 words) - 12:41, 17 October 2024
- {{Short description|Authenticated encryption mode for block ciphers}} | title= EAX: A Conventional Authenticated-Encryption Mode ...6 KB (933 words) - 17:22, 19 June 2024