First Page | Document Content | |
---|---|---|
Date: 2017-02-03 04:27:06Cryptography Public-key cryptography Homeomorphisms Homomorphic encryption Proxy re-encryption Malleability Message authentication code Paillier cryptosystem RSA Digital signature | This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. HomomorphicAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 478,12 KBShare Document on Facebook |
ˇ HOMEOMORPHISMS OF CECH–STONE REMAINDERS: THE ZERO-DIMENSIONAL CASE ILIJAS FARAH AND PAUL MCKENNEY Abstract. We prove, using a weakening of the Proper Forcing Axiom,DocID: 1uVnW - View Document | |
September 20, 2008 CREMONA TRANSFORMATIONS AND HOMEOMORPHISMS OF SURFACES ´ ´ AND FREDDocID: 1sBZO - View Document | |
Sufficient Conditions For A Group Of Homeomorphisms Of The Cantor Set To Be 2-Generated C. Bleak J. HydeDocID: 1sccB - View Document | |
C:/Users/koblitz.NETID/Downloads/tight2.dviDocID: 1rlx4 - View Document | |
545 Documenta Math. The C ∗ -Algebra of an Affine Map on the 3-Torus Kasper K.S. Andersen and Klaus ThomsenDocID: 1qqIG - View Document |