![ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem](https://www.pdfsearch.io/img/9c15c4f44945d5dc341425f5e57a0ce2.jpg)
| Document Date: 2010-06-09 09:12:09 Open Document File Size: 1,04 MBShare Result on Facebook
City Discrete Log / A.1 Identity / Related Tag / Factoring / / Company Oracle / GBD Subgroup / Symmetric Subgroup / / Facility Queensland University of Technology / Information Technology Queensland University of Technology June / Building Blocks / / Holiday Assumption / / Organization Key Recovery Authority / Organisation of the Thesis / Philosophy Information Security Institute Faculty / Queensland University of Technology / / Technology encryption / 4.3 RSA-Related Tag-Based Encryption / Identity-Based Encryption / Cryptography / Private Key / 106 5.3 Self-Escrowed ElGamal Encryption / 113 5.4 Self-Escrowed RSA-Based Encryption / public key / Cryptographic Tools A.1 Identity-Based Encryption / 2.3 Public Key Encryption / Information Technology / 1.1 Tag-Based Encryption / Self-Escrowed Encryption / PKI / Abstract Public key encryption / Secure Public-Key Encryption / Self-Escrowed CCA-secure Encryption / Self-Escrowed RSA Encryption / RSA-based Encryption / public key encryption / /
SocialTag |