Back to Results
First PageMeta Content
ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem


Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science
Add to Reading List

Document Date: 2010-06-09 09:12:09


Open Document

File Size: 1,04 MB

Share Result on Facebook

City

Discrete Log / A.1 Identity / Related Tag / Factoring / /

Company

Oracle / GBD Subgroup / Symmetric Subgroup / /

Facility

Queensland University of Technology / Information Technology Queensland University of Technology June / Building Blocks / /

Holiday

Assumption / /

Organization

Key Recovery Authority / Organisation of the Thesis / Philosophy Information Security Institute Faculty / Queensland University of Technology / /

Technology

encryption / 4.3 RSA-Related Tag-Based Encryption / Identity-Based Encryption / Cryptography / Private Key / 106 5.3 Self-Escrowed ElGamal Encryption / 113 5.4 Self-Escrowed RSA-Based Encryption / public key / Cryptographic Tools A.1 Identity-Based Encryption / 2.3 Public Key Encryption / Information Technology / 1.1 Tag-Based Encryption / Self-Escrowed Encryption / PKI / Abstract Public key encryption / Secure Public-Key Encryption / Self-Escrowed CCA-secure Encryption / Self-Escrowed RSA Encryption / RSA-based Encryption / public key encryption / /

SocialTag