First Page | Document Content | |
---|---|---|
Date: 2003-06-03 09:36:43ID-based encryption Certificate-based encryption Crypt Ciphertext ID-based cryptography Proxy re-encryption Cryptography Public-key cryptography Electronic commerce | Certificate-Based Encryption and the Certificate Revocation ProblemAdd to Reading ListSource URL: www.cis.nctu.edu.twDownload Document from Source WebsiteFile Size: 434,38 KBShare Document on Facebook |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1xVFh - View Document | |
Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† AbstractDocID: 1uJpL - View Document | |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1tQVA - View Document | |
Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ AbstractDocID: 1tqoX - View Document |