<--- Back to Details
First PageDocument Content
Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography
Date: 2011-10-10 23:51:30
Electronic commerce
Computational hardness assumptions
Hidden Field Equations
Pseudorandom generator
RSA
XTR
Learning with errors
Clique problem
One-way function
Cryptography
Finite fields
Public-key cryptography

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Download Document from Source Website

File Size: 497,73 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document