<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security
Date: 2018-03-27 10:44:26
Cryptography
Public-key cryptography
Ciphertext indistinguishability
ID-based encryption
Chosen-plaintext attack
RSA
Ciphertext
Proxy re-encryption
Homomorphic encryption
XTR
Key encapsulation
Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 521,22 KB

Share Document on Facebook

Similar Documents

Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université Paris

Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université Paris

DocID: 1uhxx - View Document

Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukha

Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukha

DocID: 1u5Iq - View Document

FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

DocID: 1tCj6 - View Document

CS 161  Computer Security Spring 2010

CS 161 Computer Security Spring 2010

DocID: 1aqIr - View Document

SOA Security  What is challenging? Construction

SOA Security What is challenging? Construction

DocID: 18IJX - View Document