Add solution for 4f

This commit is contained in:
Tobias Eidelpes 2022-06-15 16:02:42 +02:00
parent d9317a77ce
commit 4e7777a8ea

View File

@ -202,7 +202,9 @@
also easily be able to obtain the factorization of the public key. If that also easily be able to obtain the factorization of the public key. If that
was possible, the scheme would be broken. was possible, the scheme would be broken.
\item \TODO \item The strongest type of security the authors claim to achieve is
IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve
IND-CCA2 security.
\item \TODO \item \TODO