| Document Date: 2005-09-02 12:11:39 Open Document File Size: 109,29 KBShare Result on Facebook
Company AES / Cryptographic File Systems / Storage Area Networks / IBM / / / IndustryTerm verification algorithm / deterministic polynomial-time algorithms / probabilistic polynomial-time algorithm / deterministic decryption algorithm / probabilistic encryption algorithm / verification algorithms / pseudo-random function applications / diverse solutions / decryption algorithm / data storage systems / public-key infrastructure / file systems / update algorithm / user key derivation algorithm / extraction algorithm / deterministic algorithms / direct applications / polynomial-time algorithms / storage solutions / probabilistic tagging algorithm / deterministic verification algorithm / decryption algorithms / storage systems / deterministic initialization algorithms / recent systems / polynomial-time adversary algorithm / initialization algorithm / authentication algorithms / computing / trusted key server / encryption algorithm / / OperatingSystem Unix / / Person Michael Backes Christian Cachin Alina / Christian Cachin Alina Oprea / / Position cpa-lr AdvE lr cpa / cpa / / Product CH-8803 R / / ProvinceOrState Massachusetts / / Technology polynomial-time adversary algorithm / three algorithms / secret-key encryption / 3 Symmetric Encryption / probabilistic tagging algorithm / namely symmetric encryption / authentication algorithms / Derivelr algorithms / tagging algorithm / Derive algorithms / key extraction algorithm / verification algorithms / corresponding algorithms / Unix / encryption algorithm / symmetric-key encryption / probabilistic encryption algorithm / block cipher / Extract algorithms / secret key / decryption algorithms / Gen algorithm / public-key infrastructure / Init algorithm / two algorithms / four deterministic polynomial-time algorithms / user key derivation algorithm / encryption / file data encryption / deterministic verification algorithm / five polynomial-time algorithms / public key / deterministic decryption algorithm / verification algorithm / key update algorithm / probabilistic polynomial-time algorithm / simulation / decryption algorithm / deterministic initialization algorithms / initialization algorithm / /
SocialTag |