A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
The Complexity of Public-Key Cryptography
[chapter]
2017
Tutorials on the Foundations of Cryptography
We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for public-key encryption schemes, and the types of evidence we have for the veracity of these assumptions.
doi:10.1007/978-3-319-57048-8_2
fatcat:74ecqky6sraifpvfnylqxc6jom