Cryptographic hash function

Results: 1121



#Item
131Analytic number theory / Elliptic curve / Group theory / Mathematics / Hash function / Cryptographic hash function / Information retrieval / Artificial intelligence / Boneh/Franklin scheme / Cryptography / Search algorithms / Hashing

Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-10-23 17:02:32
132Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
133Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

Microsoft PowerPoint - secproto.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:46:23
134RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
135RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
136Finite fields / Information theory / Information / Computing / Mathematics / Network coding / Cryptographic hash function / Hash function / One-way function / Hashing / Cryptography / Coding theory

On the Practical and Security Issues of Batch Content Distribution Via Network Coding Qiming Li Dah-Ming Chiu John C.S. Lui Computer & Information Science Dept

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-08-26 01:38:18
137Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
138Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
139Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
140Key management / Digital signature / Electronic signature / Non-repudiation / Public key certificate / Signature / CAdES / Cryptographic hash function / Digital signatures and law / Cryptography / Public-key cryptography / Notary

Abhinav International Monthly Refereed Journal of Research In Management & Technology Volume II, March’13 ISSN –

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2013-12-17 06:25:33
UPDATE