Back to Results
First PageMeta Content
Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack


Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano
Add to Reading List

Document Date: 2009-09-20 23:33:23


Open Document

File Size: 217,91 KB

Share Result on Facebook

Company

Let AE / Advind AE AE AE / Experiment Expind AE / P (0) AE / Oracle / Pr Expind AE AE As / Pr [I = i] Pr Expind AE / /

Currency

USD / /

IndustryTerm

generation algorithm / higher level protocols / encrypted communications / stateful asymmetric encryption algorithms / deterministic decryption algorithm / decryption algorithms / decryption algorithm / desired and appropriate tool / encryption algorithm / /

Position

IND-CPA / /

Technology

encryption / 4 ASYMMETRIC ENCRYPTION / 2 ASYMMETRIC ENCRYPTION / cryptography / three algorithms / RAM / key generation algorithm / public key / deterministic decryption algorithm / 8 ASYMMETRIC ENCRYPTION / public-key encryption / encryption algorithm / symmetric and asymmetric encryption / The encryption algorithm / 11 Asymmetric Encryption / private key / 10 ASYMMETRIC ENCRYPTION / higher level protocols / secret key / 11.4 Hybrid encryption / decryption algorithm / digital signature / decryption algorithms / key-generation algorithm / 6 ASYMMETRIC ENCRYPTION / example protocols / 11.1 Asymmetric encryption / stateful asymmetric encryption algorithms / /

SocialTag