| Document Date: 2015-04-27 06:52:51 Open Document File Size: 524,28 KBShare Result on Facebook
/ Facility University Bochum / Sven Sch¨age Horst G¨ortz Institute / / IndustryTerm limited applications / derivation algorithm / candidate solution / non-interactive key exchange protocols / correct solution / exhaustive search / theoretical search / / Organization Sven Sch¨age Horst G¨ortz Institute for IT Security / / Person Tibor Jager / A. Ideally / Yong Li / Christoph Bader / Sven Sch / / Position standard IND-CPA / / Technology encryption / cryptography / non-interactive key exchange protocols / secret key / simulation / public key / digital signature / public-key encryption / key exchange protocols / key derivation algorithm / hierarchical identity-based encryption / /
SocialTag |