Computational hardness assumptions

Results: 76



#Item
21THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE Javed Samuel — javed[at]isecpartners[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020 San Francisco, CA 94105

THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE Javed Samuel — javed[at]isecpartners[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020 San Francisco, CA 94105

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-04-02 07:42:28
22Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-14 14:00:36
23Improvement of Ma ni ke ta l .

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
24Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
25Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller

Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:23:19
26The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-06 19:27:51
27Two novel applications of bilinear groups to ABE encryption Riccardo Longo  Department of Mathematics, University of Trento, Italy Chiara Marcolla  Department of Mathema

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
28CS355: Topics in cryptography  Spring 2014 Assignment #1 Due: Tuesday, May. 13, 2014.

CS355: Topics in cryptography Spring 2014 Assignment #1 Due: Tuesday, May. 13, 2014.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-07 00:53:37
29CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49
30CS255: Cryptography and Computer Security  Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182.

CS255: Cryptography and Computer Security Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-18 23:13:10