Topic: security leaks and weaknesses
Topic: public key encryption
| |
Reference
Nishioka, M., Satoh, H., Sakurai, K.,
"Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring", in Kim, K. (ed.),
Information Security and Cryptology -- ICISC 2001, 4th International Conference, Seoul, Korea, December 2001, Springer, LNCS 2288, pp. 81-102.
Google
Quotations
81 ;;Quote: fast public-key encryption based on modular squaring; secure against an adaptive chosen-ciphertext attack
| 82 ;;Quote: ideal properties for public-key encryption are security against adaptive attacks, fast encryption and decryption, ciphertext same length as plaintext, large plaintext space, and small memory size
|
Related Topics
Topic: security leaks and weaknesses (67 items)
Topic: public key encryption (30 items)
|