First Page | Document Content | |
---|---|---|
Date: 2006-11-28 08:58:14Ciphertext indistinguishability Semantic security RSA Hybrid cryptosystem Adaptive chosen-ciphertext attack Public-key cryptography Chosen-ciphertext attack Key Cipher Cryptography Key encapsulation ID-based encryption | Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 268,39 KBShare Document on Facebook |