34
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Public-Key Encryption Schemes with Auxiliary Inputs

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Private Circuits: Securing Hardware against Probing Attacks

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption

                Bookmark

                Author and book information

                Book Chapter
                2010
                : 361-381
                10.1007/978-3-642-11799-2_22
                b3c09f4a-14a8-4f6c-9bfc-85d47579cb2e

                http://www.springer.com/tdm

                History

                Comments

                Comment on this book

                Book chapters

                Similar content4,374

                Cited by24