Cryptographic protocols

Results: 3642



#Item
981Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage

A Threshold Visual Cryptography Scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:45:43
982Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
983Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
984Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
985Key distribution / Wireless sensor network / ID-based encryption / Public-key cryptography / Key-agreement protocol / Pairing-based cryptography / Sensor node / Key / Elliptic curve cryptography / Cryptography / Key management / Cryptographic protocols

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
986Password authentication protocol / Password / Cryptographic nonce / Information / Cryptographic protocols / Security / Internet protocols / Computer security

Cryptanalysis of the Yang -Wang’s password authentication schemes Jue-Sam Chou1, Ming-De Yang2, Guey-Chuen Lee3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 03:33:04
987Information / Model theory / Proof of knowledge / Zero-knowledge proof / Structure / Homomorphism / IP / Communications protocol / Golden ratio / Cryptographic protocols / Data / Mathematics

Efficiency Limitations for Σ-Protocols for Group Homomorphisms ? (Full Version) Endre Bangerter1 , Jan Camenisch2 , and Stephan Krenn3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 11:23:33
988Finite fields / Computability theory / Cryptographic protocols / Computational complexity theory / Diffie–Hellman problem / XTR / Random self-reducibility / Oracle machine / Reduction / Theoretical computer science / Applied mathematics / Mathematics

Irreducibility to the One-More Evaluation Problems: More May Be Less Daniel R. L. Brown∗ June 9, 2010 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-09 14:57:08
989Mathematics / Quantum complexity theory / Accumulator / Central processing unit / Zero-knowledge proof / Proof of knowledge / Polynomial / Function / NP / Cryptography / Cryptographic protocols / Applied mathematics

Zero-Knowledge Accumulators and Set Operations Esha Ghosh1 , Olga Ohrimenko2 , Dimitrios Papadopoulos3 , Roberto Tamassia1 and Nikos Triandopoulos4,3 1 Dept. of Computer Science, Brown University, Providence RI, USA esha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 18:00:30
990Wireless networking / Computing / Computer network security / Technology / Secure communication / Wi-Fi Protected Access / Ralink / Linksys / IEEE 802.11i-2004 / Cryptographic protocols / Cryptography / IEEE 802.11

Microsoft Word - smxWiFi.doc

Add to Reading List

Source URL: www.coressentinc.com

Language: English - Date: 2013-06-08 18:09:00
UPDATE