on generating the initial key in the bounded storage model
play

On Generating the Initial Key in the Bounded-Storage Model Main - PowerPoint PPT Presentation

On Generating the Initial Key in the Bounded-Storage Model Main idea Instead of assuming that Motivation Motivation Common Motivation Common practice in cryptography: If you need an encryption scheme then take AES (or IDEA, RSA, . . . ). Y


  1. On Generating the Initial Key in the Bounded-Storage Model

  2. Main idea Instead of assuming that

  3. Motivation

  4. Motivation Common

  5. Motivation Common practice in cryptography: If you need an encryption scheme then take AES (or IDEA, RSA, . . . ). Y

Recommend


More recommend