Hybrid cryptosystem

Results: 12



#Item
11Cyberwarfare / ID-based encryption / Ciphertext / ElGamal encryption / Hybrid cryptosystem / RSA / Cipher / Access control / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner† and Peter Steenkiste†‡ † Computer Science Department ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-06-27 14:38:48
12Adaptive chosen-ciphertext attack / Chosen-ciphertext attack / RSA / ElGamal encryption / Optimal asymmetric encryption padding / Malleability / Hybrid cryptosystem / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Semantic security

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2003-08-14 10:56:28
UPDATE