Semantic security

Results: 252



#Item
221Simple Identity-Based Cryptography with Mediated RSA ? Xuhua Ding and Gene Tsudik Department of Information and Computer Science, University of California, Irvine. Email: {xhding,gts}@ics.uci.edu

Simple Identity-Based Cryptography with Mediated RSA ? Xuhua Ding and Gene Tsudik Department of Information and Computer Science, University of California, Irvine. Email: {xhding,gts}@ics.uci.edu

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2005-07-01 12:17:37
222

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
223Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-12-07 02:49:54
224CS255: Cryptography and Computer Security  Winter 2013 Final Exam Instructions:

CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-13 00:34:50
225CS255: Cryptography and Computer Security  Winter 2011 Final Exam Instructions:

CS255: Cryptography and Computer Security Winter 2011 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-29 15:51:55
226CS255: Introduction to Cryptography  Winter 2014 Assignment #2: Solutions Answer 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

CS255: Introduction to Cryptography Winter 2014 Assignment #2: Solutions Answer 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-15 12:14:59
227RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
228Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 13:45:26
229Author manuscript, published in

Author manuscript, published in "Financial Cryptography, 4th International Conference[removed]104"

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2011-02-11 09:14:00
230LNCS[removed]Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

LNCS[removed]Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

Add to Reading List

Source URL: www.liammorris.com

Language: English - Date: 2013-04-30 09:09:49