First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2012-05-22 17:51:17Open Document File Size: 416,83 KBShare Result on FacebookCityKFC / Factorization / Seoul / Cambridge / /CompanyOracle / SRI International Computer Science Laboratory / /CountryUnited States / Korea / /CurrencyUSD / / /FacilityNational Institute of Standards and Technology / FIPS PUB / Massachusetts Institute of Technology / /IndustryTermsetup algorithm / generic factoring algorithms / acceptance algorithm / verification algorithm / Sign algorithm / polynomial-time algorithm / classical key generation algorithm / validation algorithm / deterministic polynomialtime algorithm / online transactions / deterministic polynomial-time algorithm / probabilistic algorithms / legislative infrastructure / Online Judges Alternatively / computing / security protocols / e-th / polynomialtime algorithm / /OrganizationMassachusetts Institute of Technology / EPFL Ecole Polytechnique Fédérale / National Institute of Standards and Technology / National Competence Center / US Federal Reserve / European Commission / TTP / /PersonMarkulf Kohlweiss / Avradip Mandal / Willy Susilo / Martin Hellman / Silvio Micali / Katja Schmidt-Samoa / Ivan Damgård / Ron Rivest / Josh Cohen Benaloh / Ronald L. Rivest / Niko Bari / Antoine Joux / Eugène van Heijst / Anna Lysyanskaya / Arjen K. Lenstra / Phillip Rogaway / Whitfield Diffie / Torben P. Pedersen / Jan Camenisch / Claudio Soriente / Jean-Sébastien Coron / Eugène van Heyst / Robert Silverman / Josef Pieprzyk / Michael Waidner / Mihir Bellare / Jens Groth / Eric R. Verheul / Reihaneh Safavi-Naini / Thomas Baignères / Georg Frobenius / Shafi Goldwasser / Michael O. Rabin / Leslie Lamport / David Naccache / Matthieu Finiasz / Jacques Stern / Birgit Pfitzmann / Mehdi Tibouchi / Atefeh Mashatan / /Positionadaptive chosen message attack model / candidate for our PRF / malicious judge / General / judge / /ProvinceOrStateSaskatchewan / Massachusetts / /PublishedMediumCryptology ePrint Archive / IEEE Transactions on Information Theory / Lecture Notes in Computer Science / /TechnologyLAN / classical key generation algorithm / acceptance algorithm / probabilistic algorithms / generic factoring algorithms / setup algorithm / block cipher / corresponding validation algorithm / private key / security protocols / Accept algorithm / secret key / polynomialtime algorithm / Generic PPT algorithms / deterministic polynomial-time algorithm / validation algorithm / encryption / cryptography / Validate algorithm / KeyGen algorithm / PPT protocol / PPT algorithm / following five algorithms / deterministic polynomialtime algorithm / public key / signing algorithm / Sign algorithm / polynomial-time algorithm / verification algorithm / Digital Signature / factoring algorithms / four algorithms / five algorithms / extended Euclidean algorithm / /URLhttp /SocialTag |