First Page | Document Content | |
---|---|---|
![]() Date: 2011-09-26 20:34:40Theoretical computer science Mathematics Merkle–Hellman knapsack cryptosystem Knapsack problem Ciphertext Rabin cryptosystem Schmidt–Samoa cryptosystem Public-key cryptography Applied mathematics Cryptography | Source URL: ced.osakac.ac.jpDownload Document from Source WebsiteFile Size: 218,73 KBShare Document on Facebook |
![]() | Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1xVFh - View Document |
![]() | Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† AbstractDocID: 1uJpL - View Document |
![]() | Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1tQVA - View Document |
![]() | Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ AbstractDocID: 1tqoX - View Document |