Text
Black-box models of computation in cryptology
Introduction --
Black-Box Models of Computation --
On Black-Box Ring Extraction and Integer Factorization --
Analysis of Cryptographic Assumptions in the Generic Ring Model --
The Generic Composite Residuosity Problem --
Semi-Generic Groups and Their Applications.
No other version available