Back to Results
First PageMeta Content
Probabilistic encryption / Probability theory / Random oracle / RSA / Advantage / Chosen-ciphertext attack / Cipher / Digital signature / Key size / Cryptography / Public-key cryptography / Key management


A “proof-reading” of some issues in cryptography Ivan Damg˚
Add to Reading List

Document Date: 2007-10-01 04:24:00


Open Document

File Size: 113,87 KB

Share Result on Facebook

Company

Fiat / /

Facility

University of Aarhus Abstract / /

IndustryTerm

decryption equipment / cryptographic systems / polynomial time algorithm / complicated and contrived systems / decryption algorithm / impractical solutions / complicated systems / /

Organization

Department of Computer Science / University of Aarhus Abstract / /

Person

Leonid Reyzin / Amos Fiat / Eli Biham / Alfred Menezes / Silvio Micali / Adriana Palacio / Alexandra Boldyreva / Neal Koblitz / Yael T. Kalai / Shafi Goldwasser / Ivan Damg / Oded Goldreich / Daniel Bleichenbacher / Phillip Rogaway / Nathan Keller / /

Position

author / designer / general IT security / Uninstantiable RandomOracle-Model / Private / player / /

ProvinceOrState

Massachusetts / /

Technology

encryption / radiation / cryptography / public key / polynomial time algorithm / PKI / RSA encryption / mobile phone system / non-committing encryption / private key / GSM / secret key / simulation / decryption algorithm / RSA-based protocol / publickey encryption / interactive protocol / public key encryption / encrypted using public-key cryptography / /

SocialTag