Example image of eyePlorer eyePlorer map for 'Semantic security': Public-key cryptography Adversary Ciphertext Computational complexity theory CCA Chosen-ciphertext attack Ciphertext indistinguishability Chosen-plaintext attack Game Cryptosystem Adaptive chosen-ciphertext attack ElGamal encryption Goldwasser-Micali cryptosystem Paillier cryptosystem Decisional Diffie–Hellman assumption Provable security Quadratic residuosity problem Optimal Asymmetric Encryption Padding RSA Integrated Encryption Scheme Blum-Goldwasser cryptosystem Entropic security Efficient Probabilistic Public-Key Encryption Scheme Naccache-Stern knapsack cryptosystem Probabilistic encryption Computational Diffie–Hellman assumption Damgaard-Jurik cryptosystem Malleability (cryptography) Authenticated encryption Plaintext-aware encryption Deterministic encryption Higher residuosity problem Okamoto–Uchiyama cryptosystem Boneh/Franklin scheme Naccache-Stern cryptosystem Hard-core predicate Averaging argument Pseudorandom generator CEILIDH
Disclaimer