Back to Results
First PageMeta Content
Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management


Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗
Add to Reading List

Document Date: 2004-08-02 17:51:17


Open Document

File Size: 236,62 KB

Share Result on Facebook

City

Jerusalem / La Jolla / Rehovot / /

Company

CBC / /

Country

United States / Israel / /

/

Event

Reorganization / /

Facility

Weizmann Institute of Science / Laboratory of Computer Science / University of California / /

IndustryTerm

polynomial time algorithms / verification algorithm / tamper-proof processor / incremental algorithms / search tree scheme / ordinary message authentication algorithm / ordinary signing algorithm / sublinear time algorithms / incremental encryption algorithms / software protection / incremental algorithm / definitions as well as solutions / cryptographic algorithms / incremental cryptographic algorithms / incremental tagging algorithm / search tree / incremental signing algorithm / natural incremental algorithm / tamper-proof incremental systems / document systems / /

OperatingSystem

L3 / /

Organization

MIT / Israel Binational Science Foundation / Department of Applied Mathematics and Computer Science / Laboratory of Computer Science / University of California at San Diego / Department of Computer Science & Engineering / Weizmann Institute of Science / /

Person

Rabin / Oded Goldreich / /

Position

text editor / /

ProvinceOrState

California / /

PublishedMedium

the Theory of Computing / /

Technology

RAM / incremental encryption algorithms / corresponding verification algorithm / incremental cryptographic algorithms / natural incremental algorithm / sublinear time algorithms / incremental encryption / private key / randomizing algorithm / encryption / Cryptography / incremental signing algorithm / public key / ordinary signing algorithm / incremental algorithms / polynomial time algorithms / ordinary message authentication algorithm / digital signature / incremental algorithm / secure probabilistic encryption / tamper-proof processor / two signing algorithms / incremental tagging algorithm / /

SocialTag