Back to Results
First PageMeta Content
Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography


Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡
Add to Reading List

Document Date: 2011-10-10 23:51:30


Open Document

File Size: 497,73 KB

Share Result on Facebook
UPDATE