Computational hardness assumptions

Results: 76



#Item
61Computational hardness assumptions / Finite fields / Logarithms / Modular arithmetic / Group theory / Discrete logarithm / Cyclic group / Diffie–Hellman problem / Prime number / Abstract algebra / Mathematics / Algebra

ANTS IX, Nancy, France Fixed points for discrete logarithms

Add to Reading List

Source URL: www.math.dartmouth.edu

Language: English - Date: 2010-07-16 15:47:41
62Finite fields / BLS / Computational hardness assumptions / Digital signature / Full Domain Hash / Rabin signature algorithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic protocols

Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-09-08 17:10:53
63Finite fields / Cryptographic protocols / Group signature / Diffie–Hellman key exchange / Digital signature / Computational Diffie–Hellman assumption / ElGamal encryption / Diffie–Hellman problem / Schnorr signature / Cryptography / Computational hardness assumptions / Public-key cryptography

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme Giuseppe Ateniese1 , Jan Camenisch2 , Marc Joye3 , and Gene Tsudik4

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-10-24 11:52:18
64Finite fields / Computational hardness assumptions / Algebraic number theory / Cryptographic protocols / Field theory / Diffie–Hellman problem / Quadratic field / Discrete logarithm / XTR / Abstract algebra / Mathematics / Algebra

Number field cryptography Johannes Buchmann

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2004-02-18 05:25:39
65Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions

Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
66Public-key cryptography / Publicly Verifiable Secret Sharing / Finite fields / Verifiable secret sharing / Secret sharing / ElGamal encryption / Diffie–Hellman key exchange / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Cryptography / Cryptographic protocols / Computational hardness assumptions

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09
67Finite fields / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Hellman / ElGamal encryption / Whitfield Diffie / XDH assumption / Cryptography / Computational hardness assumptions / Cryptographic protocols

Workshop on Selected Areas in Cryptography[removed] – 16 august 2002, St. John’s, Newfoundland, Canada) H. Heys and K. Nyberg Eds. Springer-Verlag, LNCS 2595, pages 325–338

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2007-07-06 16:33:16
68Finite fields / Logarithms / Computational hardness assumptions / Group theory / XTR / Discrete logarithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm records / Abstract algebra / Mathematics / Cryptography

Discrete logarithms in finite fields and their cryptographic significance A. M. Odlyzko AT&T Bell Laboratories

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1998-04-13 22:10:57
69Logarithms / Computational hardness assumptions / Modular arithmetic / Key size / Cryptanalysis / Pairing-based cryptography / Discrete logarithm / Public-key cryptography / Encryption / Cryptography / Abstract algebra / Mathematics

PDF Document

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-09-12 01:05:36
70Computational hardness assumptions / Electronic commerce / RSA / Cryptographic protocols / Leonard Adleman / Adi Shamir / Diffie–Hellman problem / Ron Rivest / Cipher / Cryptography / Public-key cryptography / Turing Award laureates

PDF Document

Add to Reading List

Source URL: www.msri.org

Language: English - Date: 2004-04-09 16:58:07
UPDATE