First Page | Document Content | |
---|---|---|
Date: 2018-03-27 10:44:26Cryptography Public-key cryptography Ciphertext indistinguishability ID-based encryption Chosen-plaintext attack RSA Ciphertext Proxy re-encryption Homomorphic encryption XTR Key encapsulation Semantic security | Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of TechnologyAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 521,22 KBShare Document on Facebook |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1xVFh - View Document | |
Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† AbstractDocID: 1uJpL - View Document | |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1tQVA - View Document | |
Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ AbstractDocID: 1tqoX - View Document |