Back to Results
First PageMeta Content
Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security


RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA
Add to Reading List

Document Date: 2002-06-27 16:53:41


Open Document

File Size: 142,83 KB

Share Result on Facebook

City

Indistinguishability / Berlin / The RSA / New York / /

Company

SIAM Journal / Fiat / RSA Security Inc. / RSA Laboratories / ACM Press / /

/

Event

FDA Phase / /

Facility

C. Hall / /

IndustryTerm

cryptographic protocols / to real systems / deterministic encryption algorithm / idealized algorithms / Web server using SSL / /

Person

O. Rabin / Victor Shoup / Mihir Bellare / Dan Boneh / Eiichiro Fujisaki / Tatsuaki Okamoto / Anand Desai / Jacques Stern / Pierre-Alain Fouque / Phil Rogaway / Yves Verhoeven / David Pointcheval D´ept / /

Position

author / plaintext-extractor / /

Product

C1 / /

ProvinceOrState

New York / /

PublishedMedium

SIAM Journal on Computing / Communications of the ACM / Journal of Cryptology / /

Technology

encryption / deterministic encryption algorithm / Cryptography / public key / TLS protocol / valid encryption / Public-key Encryption / name Simplified Asymmetric Encryption / 1 v1.5 Encryption / secret key / SSL / 1 Asymmetric Encryption / public key system / C2 C3 C1 Basic encryption C2 C3 Hybrid encryption / Web server / /

URL

http /

SocialTag