First Page | Document Content | |
---|---|---|
Date: 2013-03-13 12:33:24Adaptive chosen-ciphertext attack Optimal asymmetric encryption padding Zero-knowledge proof ElGamal encryption Symmetric-key algorithm RSA Chosen-ciphertext attack Cryptography Public-key cryptography Ciphertext indistinguishability | 1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTechAdd to Reading ListSource URL: software.imdea.orgDownload Document from Source WebsiteFile Size: 1,36 MBShare Document on Facebook |
Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. RogawayDocID: 1rlwp - View Document | |
Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, GermanyDocID: 1qO3E - View Document | |
Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13DocID: 1qNBV - View Document | |
Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 AbstractDocID: 1qDIf - View Document | |
Microsoft PowerPoint - NPROM-zhang.pptxDocID: 1pGwl - View Document |