<--- Back to Details
First PageDocument Content
Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management
Date: 2008-09-15 00:54:54
Electronic commerce
Ciphertext indistinguishability
RSA
Semantic security
Cipher
ID-based cryptography
Key
Public key infrastructure
Symmetric-key algorithm
Cryptography
Public-key cryptography
Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 270,90 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document