Date: 2004-08-02 17:51:17Message authentication codes Digital signature Cryptographic hash function Cryptographic primitive RSA Key Probabilistic encryption Block cipher Galois/Counter Mode Cryptography Public-key cryptography Key management | | Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗Add to Reading ListSource URL: cseweb.ucsd.eduDownload Document from Source Website File Size: 236,62 KBShare Document on Facebook
|