CS276 Lecture 17 (draft)
Summary Today we begin to talk about public-key cryptography, starting from public-key encryption. We define the public-key analog of the weakest form of security we studied in the private-key setting:...
View ArticleCS276 Lecture 17: El Gamal
Scribed by Matt Finifter Summary Today we begin to talk about public-key cryptography, starting from public-key encryption. We define the public-key analog of the weakest form of security we studied in...
View ArticleCS276 Lecture 23 (draft)
Summary Today we show how to construct an efficient CCA-secure public-key encryption scheme in the random oracle model using RSA. As we discussed in the previous lecture, a cryptographic scheme defined...
View ArticleCS276 Lecture 19: Trapdoor Permutations
Scribed by Cynthia Sturton Summary Today we continue to discuss number-theoretic constructions of CPA-secure encryption schemes. First, we return to the Decision Diffie Hellman assumption (the one...
View Article
More Pages to Explore .....