Cryptography Research

Results: 540



#Item
311Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
312Software / Technology / Bitcoin / Peer-to-peer computing / Financial cryptography / ISO standards / Electronic money / Wallet / Public-key cryptography / Cryptography / Payment systems / Electronic commerce

Homomorphic Payment Addresses and the Pay-to-Contract Protocol Ilja Gerhardt∗ Max Planck Institute for Solid State Research, Heisenbergstraße 1, D[removed]Stuttgart, Germany Timo Hanke†

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-12-13 21:31:00
313Structure / Group signature / Random oracle / Ciphertext indistinguishability / Model theory / Oracle machine / Undeniable signature / Blind signature / Cryptography / Ring signature / Digital signature

(Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen1 , Man Ho Au1 , Joseph K. Liu2 , and Willy Susilo1 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-24 21:57:54
314Combinatorial optimization / Operations research / NP-complete problems / Dynamic programming / Cryptography / Knapsack problem / Cutting-plane method / Linear programming relaxation / Optimization problem / Theoretical computer science / Mathematical optimization / Applied mathematics

Math. Program., Ser. A[removed]:19–41 DOI[removed]s10107[removed]FULL LENGTH PAPER On the exact separation of mixed integer knapsack cuts Ricardo Fukasawa · Marcos Goycoolea

Add to Reading List

Source URL: mgoycool.uai.cl

Language: English - Date: 2011-10-28 12:33:42
315Graphics file formats / Steganography / Video / Television / Peak signal-to-noise ratio / Digital watermarking / JPEG / Visual cryptography / Digital television / Espionage / Image processing

Hindawi Publishing Corporation Advances in Multimedia Volume 2012, Article ID[removed], 9 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-05-08 04:06:59
316Finite fields / Computational complexity theory / Elliptic curve cryptography / Elliptic curves / Elliptic curve / Hyperelliptic curve cryptography / Multiplication / Time complexity / Matrix / Abstract algebra / Mathematics / Cryptography

Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra and Palash Sarkar Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
317Cryptography / Documents / Digital signature / Memorandum / National Institute of Informatics / Civil law / Notary / Legal documents

NTCIR TEST COLLECTION MEMORANDUM ON PERMISSION TO USE Instructions Please make two copies of the form for each task you will obtain in double-sided print. At the top of page 1, please enter the date, the name of your ins

Add to Reading List

Source URL: research.nii.ac.jp

Language: English - Date: 2010-12-14 19:46:14
318Proof of knowledge / Mathematical proof / Zero-knowledge proof / Malleability / Ciphertext indistinguishability / Information / Knowledge / Cryptography / Cryptographic protocols / Mathematics

Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase Microsoft Research Redmond [removed] Markulf Kohlweiss

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:48:04
319Science / Evaluation methods / Scientific method / Codebook / Questionnaire / Coding / Code / Cryptography / Research methods / Statistics

Microsoft Word - D4_4_4 Report on lessons learned in common coding_31May

Add to Reading List

Source URL: www.microdis-eu.be

Language: English - Date: 2014-12-09 09:25:50
320Access control / Zero-knowledge proof / Commitment scheme / IP / Authentication / Public-key cryptography / Cryptography / Cryptographic protocols / Proof of knowledge

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation Man Ho Au,† Apu Kapadia,‡ Willy Susilo† † Centre for Computer and Information Security Research

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2014-08-19 21:15:38
UPDATE