Sciweavers

31 search results - page 7 / 7
» Direct Chosen-Ciphertext Secure Identity-Based Key Encapsula...
Sort
View
CCS
2010
ACM
15 years 10 hour ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...