Date: 2009-09-20 23:33:23Chosen-plaintext attack Ciphertext Cipher Advantage RSA Symmetric-key algorithm Public-key cryptography Hybrid cryptosystem Semantic security Cryptography Ciphertext indistinguishability Chosen-ciphertext attack | | Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while anoAdd to Reading ListSource URL: cseweb.ucsd.eduDownload Document from Source Website File Size: 217,91 KBShare Document on Facebook
|