Unformatted text preview: Ref: Extended abstract in Proc. First Annual Conference on Computer and Communications Security, ACM, 1993. Full paper available below. Full paper: Available as compressed postscript , postscript , or pdf . ( Help if this doesn't work). Related work and links Our most important schemes designed using the random oracle model are the PSS (Probabilistic Signature Scheme, for signing with RSA) and OAEP (Optimal Asymmetric Encryption Padding/ Protocol, for encryption with RSA). We also used this model in the design of incremental hash functions . Following our work, the random oracle model has been used in numerous other places. file:///C|/Documents%20and%20Settings/Linda%20Grauer/My. ..ents/Dolores/Berkeley-H2/CS276/2.07%20this%20paper.html [2/4/2008 11:46:16 AM]...
View Full Document
- Spring '02
- Cryptography, Communications security, random oracle model, M. Bellare