<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function
Date: 2015-02-21 09:51:42
Cryptography
Cryptographic hash functions
Public-key cryptography
Hashing
Search algorithms
CramerShoup cryptosystem
RSA
ElGamal encryption
Crypt
Hash function
Ciphertext
Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Download Document from Source Website

File Size: 671,53 KB

Share Document on Facebook

Similar Documents

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. Consider an electronic election scheme implemented using a

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

DocID: 1q9YH - View Document

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

DocID: 1pPLX - View Document

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

DocID: 1pov5 - View Document

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

DocID: 1nsfx - View Document

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

DocID: 1mzth - View Document