Cryptography Research

Results: 540



#Item
201Public key certificate / HTTP Secure / Cryptography / Computer security / Anonymity / Electronic commerce / Secure communication / Security

Michael Waidner () IBM Zurich Research Laboratory CH8803 Rüschlikon -- Schweiz Secure Electronic Marketplace for Europe

Add to Reading List

Source URL: www.semper.org

Language: English
202Computing / Password-authenticated key agreement / Diffie–Hellman key exchange / XTR / Diffie–Hellman problem / File Transfer Protocol / Password / Password Authenticated Key Exchange by Juggling / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-21 19:36:43
203Telecommunications engineering / Research In Motion / S&P/TSX 60 Index / Elliptic curve cryptography / Economy of Canada / Server / Network-attached storage / Storage area network / Electronic engineering / Computer storage / Computing / Local area networks

Success Story Certicom Certicom was founded in 1985 by a team of world-class cryptographers at the University of Waterloo in Ontario, Canada. In those early days, the researchers were intent on making elliptic curve cryp

Add to Reading List

Source URL: www.openstore.com

Language: English
204Interactive proof system / Non-interactive zero-knowledge proof / Proof of knowledge / IP / Soundness / Zero-knowledge proof / NP / Random oracle / Oracle machine / Cryptography / Theoretical computer science / Cryptographic protocols

On The (In)security Of Fischlin’s Paradigm P RABHANJAN A NANTH Microsoft Research India V IPUL G OYAL Microsoft Research India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 10:18:26
205Integer factorization algorithms / Cryptography standards / British culture / Royal Society of Arts / United Kingdom

Regional Studies Association Early Career Grant Scheme Impact Report The Impact Report should be submitted within 12 months of completing the research.

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2014-08-05 05:57:37
206Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
207Costs / Electronic commerce / Public-key cryptography / RSA

RSA RESEARCH NETWORK CLAIM FORM

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2015-03-03 05:47:24
208Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
209Advantage / Ciphertext indistinguishability / Cisco IOS / Oracle machine / Key-agreement protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane Q 4001, Austr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-01 20:41:44
210Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
UPDATE