Login / Signup

Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).

Seungjoo KimJung Hee CheonMarc JoyeSeongan LimMasahiro MamboDongho WonYuliang Zheng
Published in: IMACC (2001)
Keyphrases
  • chosen ciphertext
  • encryption scheme
  • ciphertext
  • databases
  • data streams
  • query processing
  • low cost