Highlight the differences between COA Security in the Public and Private-Key World
State similarities between RSA Assumption and Factoring Assumption
Discuss the Hybrid Public-Key Encryption Scheme
Explain the applications of the Padded RSA Public-Key Cryptosystem
Outline the relationship between COA, Single-message and CPA security