First Page | Document Content | |
---|---|---|
![]() Date: 2015-04-06 23:12:57Certificate-based encryption Advantage Cipher RSA ID-based encryption Chosen-ciphertext attack Cryptography Public-key cryptography Electronic commerce | Add to Reading List |
![]() | ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.orgDocID: 1kwGr - View Document |
![]() | This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followiDocID: 19fDT - View Document |
![]() | An Improved ID-based Authenticated Group Key Agreement SchemesDocID: 13lXc - View Document |
![]() | Lecture Notes in Computer Science:DocID: 12OA3 - View Document |
![]() | Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.docDocID: 11RlP - View Document |