![Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security](https://www.pdfsearch.io/img/71a307696bd23a1b320b0b05a3e51bd6.jpg)
| Document Date: 2001-05-29 06:07:19 Open Document File Size: 193,73 KBShare Result on Facebook
Company Tatsuaki Okamoto NTT Labs / Section 2 / / Country France / Japan / / / Event FDA Phase / Product Recall / Product Issues / / IndustryTerm generation algorithm / decryption algorithm / encryption algorithm / / Organization Ecole Normale Suprieure / / Person David Pointcheval / Victor Shoup / Abstract Recently Victor Shoup / Jacques Stern / / Product basic notions of asymmetric encryption / CCA2 / CCA1 / / Technology encryption / key generation algorithm / public key / public-key encryption / encryption algorithm / private key / secret key / 3 2 Public-Key Encryption / Simulation / decryption algorithm / 2 Public-Key Encryption / / URL http /
SocialTag |