![Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack](https://www.pdfsearch.io/img/f79439da9ea353e724004013bf641ea6.jpg) Date: 2009-09-20 23:33:23Chosen-plaintext attack Ciphertext Cipher Advantage RSA Symmetric-key algorithm Public-key cryptography Hybrid cryptosystem Semantic security Cryptography Ciphertext indistinguishability Chosen-ciphertext attack | | Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while anoAdd to Reading ListSource URL: cseweb.ucsd.eduDownload Document from Source Website File Size: 217,91 KBShare Document on Facebook
|