Blum–Goldwasser cryptosystem

Results: 20



#Item
1Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1999-02-17 16:51:49
2Advantage / RSA / One-time pad / Ciphertext / Probabilistic encryption / Blum–Goldwasser cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-04-25 09:16:13
3RSA / Blum–Goldwasser cryptosystem / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-09-07 12:28:06
4RSA / Rabin cryptosystem / Ciphertext / Cipher / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

The BlueJay Ultra-Lightweight Hybrid Cryptosystem

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:20
5RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
6Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
7Ciphertext indistinguishability / RSA / Probabilistic encryption / Oblivious transfer / IP / Index of cryptography articles / Blum–Goldwasser cryptosystem / Cryptography / Electronic commerce / Public-key cryptography

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
8Ciphertext / RSA / Block cipher modes of operation / Cipher / ElGamal encryption / Semantic security / Symmetric-key algorithm / Blum–Goldwasser cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
9Cipher / Mix network / RSA / Block cipher / Chosen-ciphertext attack / Key / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53
10RSA / ElGamal encryption / Diffie–Hellman key exchange / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Assignment #2 Winter 2000

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-31 14:21:01
UPDATE