<--- Back to Details
First PageDocument Content
ID-based encryption / Advantage / Certificate-based encryption / Ciphertext / Standard model / ID-based cryptography / RSA / Cipher / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce
Date: 2010-12-04 06:00:47
ID-based encryption
Advantage
Certificate-based encryption
Ciphertext
Standard model
ID-based cryptography
RSA
Cipher
Ciphertext indistinguishability
Cryptography
Public-key cryptography
Electronic commerce

Lecture Notes in Computer Science:

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 257,93 KB

Share Document on Facebook

Similar Documents

Cryptography / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Padding oracle attack / RSA / Messages / Block cipher mode of operation / ICloud / Authenticated encryption / Symmetric-key algorithm

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document