First Page | Document Content | |
---|---|---|
Date: 2018-03-27 10:44:26Cryptography Public-key cryptography Ciphertext indistinguishability ID-based encryption Chosen-plaintext attack RSA Ciphertext Proxy re-encryption Homomorphic encryption XTR Key encapsulation Semantic security | Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of TechnologyAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 521,22 KBShare Document on Facebook |
Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université ParisDocID: 1uhxx - View Document | |
Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir SoukhaDocID: 1u5Iq - View Document | |
FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,DocID: 1tCj6 - View Document | |
CS 161 Computer Security Spring 2010DocID: 1aqIr - View Document | |
SOA Security What is challenging? ConstructionDocID: 18IJX - View Document |