Back to Results
First PageMeta Content
Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability


Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex
Add to Reading List

Document Date: 2006-01-02 00:25:23


Open Document

File Size: 252,03 KB

Share Result on Facebook

Company

Ea / E0 / /

Currency

pence / /

/

Facility

University of California / /

IndustryTerm

generation algorithm / point counting algorithms / interactive probabilistic algorithm / /

Organization

University of California / Berkeley / German Academic Exchange Service / EtA / /

Person

Reynald Lercier / /

ProvinceOrState

California / Saskatchewan / /

Technology

Encryption / cryptography / Concepts Public-Key Encryption / point counting algorithms / secret key / key generation algorithm / public key / 1 Introduction Where encryption / public-key encryption / interactive probabilistic algorithm / stream cipher / RSA encryption / /

SocialTag