<--- Back to Details
First PageDocument Content
Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography
Date: 2011-10-10 23:51:30
Electronic commerce
Computational hardness assumptions
Hidden Field Equations
Pseudorandom generator
RSA
XTR
Learning with errors
Clique problem
One-way function
Cryptography
Finite fields
Public-key cryptography

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Download Document from Source Website

File Size: 497,73 KB

Share Document on Facebook

Similar Documents

On the mathematical structure and hidden symmetries of the Born-Infeld field equations Diego Julio Cirilo-Lombardo JINR University, Russian federation

On the mathematical structure and hidden symmetries of the Born-Infeld field equations Diego Julio Cirilo-Lombardo JINR University, Russian federation

DocID: 1q3Tb - View Document

Introduction  The MQ Problem Polynomial Equivalence Problems

Introduction The MQ Problem Polynomial Equivalence Problems

DocID: 1nx18 - View Document

MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

DocID: 18rai - View Document

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak†  Avi Wigderson‡

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

DocID: 18odj - View Document

PDF Document

DocID: 17s8a - View Document