Cryptography Research

Results: 540



#Item
271Cryptography standards / Cryptography / Elliptic curve cryptography / SECG / Elliptic curve / Ellipse / Abstract algebra / Finite fields / Mathematics

S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: [removed]

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:13
272Dynamic programming / Operations research / Cryptography / Combinatorial optimization / Knapsack problem / Subset sum problem / Sequence / Exponentiation / Linear programming / Mathematics / Theoretical computer science / Computational complexity theory

Sage Reference Manual: Numerical Optimization Release 6.6.beta0 The Sage Development Team

Add to Reading List

Source URL: sagemath.org

Language: English - Date: 2015-02-21 07:35:22
273Cryptography / Elliptic curve cryptography / SECG / Elliptic curve / IEEE P1363 / Parameter / Integrated Encryption Scheme / Cryptography standards / Mathematics / Finite fields

Standards for Efficient Cryptography SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: Daniel R. L. Brown ([removed]) January 27, 2010

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:12
274Random oracle / Side channel attack / Leakage / Pseudorandom generator / RSA / Digital signature / Information leakage / Cryptography / Public-key cryptography / Timing attack

Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-17 13:35:44
275Simple public key infrastructure / Authorization certificate / X.509 / Revocation list / Public key certificate / X.500 / Certificate authority / Web of trust / Cryptography / Public-key cryptography / Key management

Network Working Group C. Ellison Request for Comments: _2693_ Intel Category: Experimental B. Frantz

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2007-01-11 18:56:08
276Internet privacy / Clinical Data Management / Clinical research / Electronic patient-reported outcome / Diary / Password / Public-key cryptography / Transport Layer Security / World Wide Web / Ethics / Internet / Computing

Obtaining Sensitive Data Through the Web: An Example of Design and Methods Atar Baer,1 Stefan Saroiu,2 and Laura A. Koutsky1 Abstract: Several studies have suggested that the quality of coital data from diaries is superi

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2005-03-02 21:13:42
277Authentication / Notary / Packaging / Authenticity in art / Cryptographic protocols / Security / Cryptography / Access control

This is a post-refereeing final draft. When citing, please refer to the published version: Cohen, E. and Cohen, S.A[removed]Authentication: Hot and Cool. Annals of Tourism Research, 39(3), [removed]DOI: [removed]j.anna

Add to Reading List

Source URL: epubs.surrey.ac.uk

Language: English - Date: 2013-09-23 15:28:16
278Digital media / Grants / Research / International Cryptology Conference / International Association for Cryptologic Research / Reihaneh Safavi-Naini / Electronic submission / Academic publishing / Academic conference / Cryptography / Academia / Competitions

Call for Papers CRYPTO 2012 August 19–23, 2012 Santa Barbara, California, USA www.iacr.org/conferences/crypto2012/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-05-06 17:42:37
279Internet privacy / Public-key cryptography

Koi: A Location-Privacy Platform for Smartphone Apps Saikat Guha Microsoft Research India [removed] Mudit Jain

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-27 02:23:46
280Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-05-29 07:38:50
UPDATE