Boneh

Results: 146



#Item
141Cyberwarfare / Boneh/Franklin scheme / XTR / Advantage / Polynomial / Security / Applied mathematics / Cryptography / Ciphertext indistinguishability / ID-based encryption

Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme Liqun Chen1 and Zhaohui Cheng2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-31 15:06:27
142ID-based encryption / Forcing / Semantic security / Diffie–Hellman problem / Cryptography / Boneh/Franklin scheme / Advantage

Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 13:45:26
143Framing / HTML / Frame / Firefox / Myspace / Moving frame / Clickjacking / NoScript / Software / Computing / World Wide Web

Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites Gustav Rydstedt, Elie Bursztein, Dan Boneh

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-20 15:05:29
144Integer factorization algorithms / Modular arithmetic / Electronic commerce / RSA / Euclidean algorithm / Chinese remainder theorem / XTR / Blinding / General number field sieve / Cryptography / Mathematics / Public-key cryptography

boneh.qxp[removed]:40 AM

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 1999-03-11 11:17:10
145Israel /  Palestine /  and the United Nations / Fertile Crescent / Southern Levant / Israeli–Palestinian conflict / Charles Tegart / Palestine Police Force / Tegart / Solel Boneh / United Nations Partition Plan for Palestine / Asia / British Mandate for Palestine / Middle East

FILE AND ITEM LEVEL DESCRIPTION OF THE SIR CHARLES TEGART COLLECTION

Add to Reading List

Source URL: www.sant.ox.ac.uk

Language: English - Date: 2006-04-28 10:56:26
146Electronic commerce / ID-based encryption / Chosen-ciphertext attack / Certificate-based encryption / Cipher / Boneh/Franklin scheme / Public key certificate / Certificate authority / RSA / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-09-02 18:40:07
UPDATE