We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for publickey encryption schemes, and the types of evidence we have for the veracity of these assumptions.
CITATION STYLE
Barak, B. (2017). The complexity of public-key cryptography. In Information Security and Cryptography (Vol. 0, pp. 45–77). Springer International Publishing. https://doi.org/10.1007/978-3-319-57048-8_2
Mendeley helps you to discover research relevant for your work.