Back to Results
First PageMeta Content
Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions


ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety
Add to Reading List

Document Date: 2006-07-13 05:54:26


Open Document

File Size: 340,69 KB

Share Result on Facebook

IndustryTerm

natural and realistic protocol / actual protocol / insecure protocol / cryptographic protocol / certain cryptographic protocol / e-th / /

Person

Stephen Stills / ALFRED J. MENEZES / Schnorr / NEAL KOBLITZ / /

Position

rT / Prime Minister / system administrator / e-th root extractor / random oracle model / administrator / /

RadioStation

Katz / /

Technology

encryption / cryptography / private key / certain cryptographic protocol / DLP / actual protocol / Public Key / Digital Signature / natural and realistic protocol / cryptographic protocol / finding the private key / /

SocialTag