Cryptographic protocols

Results: 3642



#Item
991Public-key cryptography / Key-agreement protocol / Information / Cyberwarfare / Computing / Cryptographic protocols / Certificateless cryptography / Diffie–Hellman key exchange

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
992OSI protocols / Computing / Electronic engineering / Cryptographic hash functions / SHA-2 / Transmission Control Protocol

A Hardware Interface for Hashing Algorithms December 17, 2008 Zhimin Chen, Sergey Morozov, Patrick Schaumont Bradley Department of Electrical and Computer Engineering Virginia Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 09:14:41
993Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
994Advantage / Ciphertext indistinguishability / Cisco IOS / Oracle machine / Key-agreement protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane Q 4001, Austr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-01 20:41:44
995Computational complexity theory / Interactive proof system / NEXPTIME / Probabilistically checkable proof / IP / Cryptographic protocols / Soundness / NP / Zero-knowledge proof / Theoretical computer science / Applied mathematics / Complexity classes

How to Delegate Computations: The Power of No-Signaling Proofs Yael Tauman Kalai ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-01 02:12:54
996Computational complexity theory / IP / Proof of knowledge / Zero-knowledge proof / NP / Probabilistically checkable proof / Soundness / Formal verification / Snark / Theoretical computer science / Applied mathematics / Cryptographic protocols

Succinct Non-Interactive Arguments via Linear Interactive Proofs Nir Bitansky∗ Tel Aviv University Alessandro Chiesa MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-15 12:03:01
997Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53
998Bitcoin / Adversary / Alice and Bob / Science / Computing / Mathematical sciences / Public-key cryptography / Cryptography / Cryptographic protocols / Encryption

Course Information CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-03-29 12:23:51
999Zero-knowledge proof / Proof of knowledge / Interactive proof system / IP / Soundness / NP / Random oracle / Probabilistically checkable proof / Fiat-Shamir heuristic / Cryptography / Cryptographic protocols / Non-interactive zero-knowledge proof

An extended abstract of this paper is published in the proceedings of the 13th International Conference on Cryptology in India [21] – IndocryptThis is the full version. On the Non-malleability of the Fiat-Shamir

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-16 15:16:50
1000Cryptographic protocols / Cryptographic software / X.509 / Public key certificate / Certificate authority / OpenSSL / GLite / Cryptography / Public-key cryptography / Key management

Grid Tutorial G RID M IDDLEWARE H ANDOUTS FOR

Add to Reading List

Source URL: www.nikhef.nl

Language: English - Date: 2004-09-01 11:30:11
UPDATE