<--- Back to Details
First PageDocument Content
Computational hardness assumption / Ciphertext indistinguishability / Computer security / Cyberwarfare / Science / Cryptography / Cryptographic primitive / Information-theoretic security
Date: 2012-07-05 18:15:11
Computational hardness assumption
Ciphertext indistinguishability
Computer security
Cyberwarfare
Science
Cryptography
Cryptographic primitive
Information-theoretic security

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Download Document from Source Website

File Size: 61,49 KB

Share Document on Facebook

Similar Documents

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

DocID: 1ga1k - View Document

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

DocID: 19hjI - View Document

Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

DocID: 18cff - View Document

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

DocID: 13pBd - View Document

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

DocID: 12Nkf - View Document