Back to Results
First PageMeta Content
Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack


Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano
Add to Reading List

Document Date: 2009-09-20 23:33:23


Open Document

File Size: 217,91 KB

Share Result on Facebook
UPDATE