Cryptographic protocols

Results: 3642



#Item
991Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
992A Hardware Interface for Hashing Algorithms December 17, 2008 Zhimin Chen, Sergey Morozov, Patrick Schaumont Bradley Department of Electrical and Computer Engineering Virginia Tech

A Hardware Interface for Hashing Algorithms December 17, 2008 Zhimin Chen, Sergey Morozov, Patrick Schaumont Bradley Department of Electrical and Computer Engineering Virginia Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 09:14:41
993Improvement of Ma ni ke ta l .

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
994Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane Q 4001, Austr

Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane Q 4001, Austr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-01 20:41:44
995How to Delegate Computations: The Power of No-Signaling Proofs Yael Tauman Kalai ∗

How to Delegate Computations: The Power of No-Signaling Proofs Yael Tauman Kalai ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-01 02:12:54
996Succinct Non-Interactive Arguments via Linear Interactive Proofs Nir Bitansky∗ Tel Aviv University Alessandro Chiesa MIT

Succinct Non-Interactive Arguments via Linear Interactive Proofs Nir Bitansky∗ Tel Aviv University Alessandro Chiesa MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-15 12:03:01
997Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† †  Center for Information Security Technologies (CIST), Korea Unive

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53
998Course Information  CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

Course Information CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-03-29 12:23:51
999An extended abstract of this paper is published in the proceedings of the 13th International Conference on Cryptology in India [21] – IndocryptThis is the full version. On the Non-malleability of the Fiat-Shamir

An extended abstract of this paper is published in the proceedings of the 13th International Conference on Cryptology in India [21] – IndocryptThis is the full version. On the Non-malleability of the Fiat-Shamir

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-16 15:16:50
1000Grid Tutorial G RID M IDDLEWARE H ANDOUTS FOR

Grid Tutorial G RID M IDDLEWARE H ANDOUTS FOR

Add to Reading List

Source URL: www.nikhef.nl

Language: English - Date: 2004-09-01 11:30:11