<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security
Date: 2018-03-27 10:44:26
Cryptography
Public-key cryptography
Ciphertext indistinguishability
ID-based encryption
Chosen-plaintext attack
RSA
Ciphertext
Proxy re-encryption
Homomorphic encryption
XTR
Key encapsulation
Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 521,22 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document