Date: 2018-03-27 10:44:26Cryptography Public-key cryptography Ciphertext indistinguishability ID-based encryption Chosen-plaintext attack RSA Ciphertext Proxy re-encryption Homomorphic encryption XTR Key encapsulation Semantic security | | Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of TechnologyAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 521,22 KBShare Document on Facebook
|