Index of Security Definitions

Return to Table of Contents

 

One-time secrecy for symmetric-key encryption (Definition 2.5)

Definition2-5

t-out-of-n secret sharing (Definition 3.2):

Definition3.2

Pseudorandom generator (Definition 5.1):

Definition5.1

Pseudorandom function (Definition 6.1):

Definition6.1

Pseudorandom permutation (Definition 7.2):

Definition7.2

Strong pseudorandom permutation (Definition 7.6):

Definition7.6

CPA security for symmetric-key encryption (Definition 8.1, Section 9.2)

Definition8.1Section9.2

CPA$ security for symmetric-key encryption (Definition 8.2, Section 9.2):

Definition8.2Section9.2

CCA security for symmetric-key encryption (Definition 10.1):

Definition10.1

CCA$ security for symmetric-key encryption (Definition 10.2):

Definition10.2

MAC (Definition 11.1):

Definition11.1

Collision resistance (Definition 12.1):

Definition12.1

Key agreement (Definition 14.4):

Definition14.4

Decisional Diffie-Hellman assumption (Definition 14.5):

Definition14.5

CPA security for public-key encryption (Definition 15.1):

Definition15.1

CPA$ security for public-key encryption (Definition 15.2):

Definition15.2

One-time secrecy for public-key encryption (Definition 15.4):

Definition15.4

License

Icon for the Creative Commons Attribution-NonCommercial 4.0 International License

The Joy of Cryptography OE (1st) Copyright © 2017 by Mike Rosulek is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted.

Share This Book