An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
- 24 November 2000
- book chapter
- Published by Springer Nature
- p. 289-299
- https://doi.org/10.1007/3-540-39568-7_23
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Trapdoor pseudo-random number generators, with applications to protocol designPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- On the cryptographic security of single RSA bitsPublished by Association for Computing Machinery (ACM) ,1983
- Comparison of Two Pseudo-Random Number GeneratorsPublished by Springer Nature ,1983
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Why and how to establish a private code on a public networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- How to generate cryptographically strong sequences of pseudo random bitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Probabilistic encryption & how to play mental poker keeping secret all partial informationPublished by Association for Computing Machinery (ACM) ,1982
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978