First Page | Document Content | |
---|---|---|
Date: 2015-04-06 23:12:57Certificate-based encryption Advantage Cipher RSA ID-based encryption Chosen-ciphertext attack Cryptography Public-key cryptography Electronic commerce | Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.docAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 464,74 KBShare Document on Facebook |
ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.orgDocID: 1kwGr - View Document | |
This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followiDocID: 19fDT - View Document | |
An Improved ID-based Authenticated Group Key Agreement SchemesDocID: 13lXc - View Document | |
Lecture Notes in Computer Science:DocID: 12OA3 - View Document | |
Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.docDocID: 11RlP - View Document |