Blum–Goldwasser cryptosystem

Results: 20



#Item
1A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1999-02-17 16:51:49
2Security II: Cryptography Markus Kuhn Computer Laboratory  Lent 2012 – Part II

Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-04-25 09:16:13
3Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-09-07 12:28:06
4The BlueJay Ultra-Lightweight Hybrid Cryptosystem

The BlueJay Ultra-Lightweight Hybrid Cryptosystem

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:20
5Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
6A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
7Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
8An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
9Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53
10CS255: Cryptography and Computer Security  Assignment #2 Winter 2000

CS255: Cryptography and Computer Security Assignment #2 Winter 2000

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-31 14:21:01