Ciphertext-only attacks and weak long-term keys in T-310.
Nicolas T. CourtoisMaria-Bristena OprisanuPublished in: Cryptologia (2018)
Keyphrases
- ciphertext
- long term
- chosen plaintext attack
- encryption scheme
- secret key
- standard model
- image encryption
- private key
- proxy re encryption
- public key
- access structure
- attribute based encryption
- identity based encryption
- cca secure
- cryptographic protocols
- watermarking scheme
- smart card
- diffie hellman
- public key encryption
- database systems
- encryption algorithm
- security protocols
- security analysis
- key management
- security mechanisms
- low cost
- wavelet transform
- multiresolution