<--- Back to Details
First PageDocument Content
Cryptography / Keystroke logging / Ciphertext / Chosen-plaintext attack / Espionage / Cryptanalysis / Cryptology
Date: 2012-04-07 14:20:31
Cryptography
Keystroke logging
Ciphertext
Chosen-plaintext attack
Espionage
Cryptanalysis
Cryptology

Add to Reading List

Source URL: media.blackhat.com

Download Document from Source Website

File Size: 4,62 MB

Share Document on Facebook

Similar Documents

Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

DocID: 1xVAE - View Document

Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

DocID: 1xV9y - View Document

Algebra / Abstract algebra / Mathematics / Group theory / Linear algebra / Pairing-based cryptography / Subgroup / Pairing / XTR / Generalized flag variety

Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage

DocID: 1xV6a - View Document

Cryptography / ECRYPT / Data Encryption Standard / Mathematics

Network of Excellence in Cryptology ISTSpecial Purpose Hardware for Attacking Cryptographic Systems (SHARCS ‘06)

DocID: 1xUIR - View Document