First Page | Document Content | |
---|---|---|
Date: 2015-02-21 09:51:42Cryptography Cryptographic hash functions Public-key cryptography Hashing Search algorithms CramerShoup cryptosystem RSA ElGamal encryption Crypt Hash function Ciphertext Universal one-way hash function | This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew TechnAdd to Reading ListSource URL: www.normalesup.orgDownload Document from Source WebsiteFile Size: 671,53 KBShare Document on Facebook |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1xVFh - View Document | |
Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† AbstractDocID: 1uJpL - View Document | |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1tQVA - View Document | |
Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ AbstractDocID: 1tqoX - View Document |