Cryptographic protocols

Results: 3642



#Item
291Election fraud / Voting / Electronic voting / Information society / Ballot / Voting machine / Electoral fraud / Visual cryptography / Approval voting / Politics / Cryptography / Elections

Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
292TCP/IP / Electronic commerce / Key management / Tcpcrypt / Transmission Control Protocol / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Cryptographic protocols

Introduction tcpcrypt Performance Conclusion 1/25

Add to Reading List

Source URL: www.tcpcrypt.org

Language: English - Date: 2010-08-13 12:07:58
293

Yale University Department of Computer Science On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks — An Integrated Approach Using Game Theoretical and Cryptographic

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2004-07-28 22:46:53
    294Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

    Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2009-09-07 10:57:44
    295Elections / Electoral systems / Election technology / Voter-verified paper audit trail / Electoral fraud / Voting system / Vote counting system / Cryptography / Election recount / Politics / Election fraud / Electronic voting

    The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:46
    296Random oracle / Relational database management systems / Cross-platform software / Oracle Database / Cryptography / Software / Cryptographic hash functions

    Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

    Add to Reading List

    Source URL: www.easycrypt.info

    Language: English - Date: 2015-06-04 11:02:41
    297Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

    An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-07-21 08:57:56
    298Public-key cryptography / HTTP / Cryptographic protocols / Firefox / Smart card / HTTP Secure / Password / Root certificate / PKCS / Software / Cryptography / Free software

    Certificates installation using Mozilla Firefox (Use the following instructions starting with browser version 20 and latest versions) It is recommended to use the latest version of the browser, as it will facilitate the

    Add to Reading List

    Source URL: www.eparaksts.lv

    Language: English - Date: 2013-09-18 09:50:07
    299Internet standards / Cryptographic protocols / Public-key cryptography / Email / S/MIME / MIME / Internet media type / Cryptographic Message Syntax / PKCS / Cryptography / Computing / Internet

    Network Working Group Request for Comments: 3851 Obsoletes: 2633 Category: Standards Track B. Ramsdell, Editor

    Add to Reading List

    Source URL: www.rfc-editor.org

    Language: English - Date: 2004-07-19 20:37:49
    300OSI protocols / Routing / Wireless ad-hoc network / Packet forwarding / Link-state routing protocol / Dynamic Source Routing / Wireless networking / Network architecture / Technology

    On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ∗ — An Integrated Approach Using Game Theoretic and Cryptographic Techniques 1

    Add to Reading List

    Source URL: www-net.cs.yale.edu

    Language: English - Date: 2006-05-11 18:31:30
    UPDATE