Back to Results
First PageMeta Content
Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption


Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2
Add to Reading List

Document Date: 2006-11-28 08:58:14


Open Document

File Size: 268,39 KB

Share Result on Facebook
UPDATE