Back to Results
First PageMeta Content
Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem


SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE
Add to Reading List

Document Date: 2011-07-16 17:53:26


Open Document

File Size: 287,87 KB

Share Result on Facebook

City

Pasadena / Oshawa / New York / Oxford / Berlin / Amsterdam / Waterloo / /

Company

Jet Propulsion Laboratory / Quantum / John Wiley & Sons Ltd. / Bernstein / /

Country

Netherlands / France / United States / Canada / /

/

Event

FDA Phase / /

Facility

University of Ontario Institute / University of Waterloo / Wiley Online Library / /

IndustryTerm

generic decoding algorithms / generation algorithm / setup algorithm / t-decoding algorithm / efficient protocols / deterministic decryption algorithm / efficient cryptographic algorithms / Wireless Communications / good t-decoding algorithm / wireless mesh networks / polynomial algorithm / decryption algorithms / Online Library / encryption algorithm / /

NaturalFeature

mt. Let Fm / mt Plaintext / /

Organization

University of Waterloo / Department of Electrical and Computer Engineering / US Federal Reserve / Institute of Technology / Faculty of Business and Information Technology / Natural Sciences and Engineering Research Council / /

Person

Correspondence Xuemin (Sherman) / Z. Tua / Z. Efficient / /

Position

Cao / security model for brevity / /

Product

Goppa / CCA2 / /

ProgrammingLanguage

R / C / /

ProvinceOrState

Virginia / California / Ontario / /

PublishedMedium

Cryptology ePrint Archive / IEEE Transactions on Information Theory / Journal of Cryptology / /

Technology

randomized algorithm / designing efficient protocols / encryption algorithm / Information Technology / Wireless Communications / Micali S. Probabilistic encryption / setup algorithm / good t-decoding algorithm / smart card / private key / constructing efficient cryptographic algorithms / decryption algorithms / polynomial algorithm / public key encryption / encryption / t-decoding algorithm / cryptography / key generation algorithm / public key / deterministic decryption algorithm / simulation / digital signature / CCA2-secure encryption / generic decoding algorithms / four algorithms / /

SocialTag