Relativized cryptography
From MaRDI portal
Publication:3689089
DOI10.1109/TIT.1983.1056754zbMath0571.94011MaRDI QIDQ3689089
Publication date: 1983
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
computational security; relativized model of computation; computable oracle; length-preserving permutation; security against chosen-plaintext attacks; transient-key cryptography
Related Items
Two phases encryption and its applications, Probabilistic encryption, One-way functions and circuit complexity, New hash functions and their use in authentication and set equality, A time-luck tradeoff in relativized cryptography, A new password authentication mechanism based on two phases encryption