<--- Back to Details
First PageDocument Content
Chosen-ciphertext attack / Ciphertext / Polynomial ring / NTRUEncrypt / Cryptography / Abstract algebra / Public-key cryptography
Date: 2008-12-04 05:51:00
Chosen-ciphertext attack
Ciphertext
Polynomial ring
NTRUEncrypt
Cryptography
Abstract algebra
Public-key cryptography

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai ∗ and Stanislav Bulygin †

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 171,92 KB

Share Document on Facebook

Similar Documents

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev†  Abstract

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document