This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Ref: Extended abstract in Proc. First Annual Conference on Computer and Communications Security, ACM, 1993. Full paper available below. Full paper: Available as compressed postscript , postscript , or pdf . ( Help if this doesn't work). Related work and links Our most important schemes designed using the random oracle model are the PSS (Probabilistic Signature Scheme, for signing with RSA) and OAEP (Optimal Asymmetric Encryption Padding/ Protocol, for encryption with RSA). We also used this model in the design of incremental hash functions . Following our work, the random oracle model has been used in numerous other places. file:///C|/Documents%20and%20Settings/Linda%20Grauer/My. ..ents/Dolores/Berkeley-H2/CS276/2.07%20this%20paper.html [2/4/2008 11:46:16 AM]...
View Full Document
This note was uploaded on 02/04/2008 for the course CS 276 taught by Professor Trevisan during the Spring '02 term at Berkeley.
- Spring '02