Cryptography Research

Results: 540



#Item
511RSA / Hash function / One-way function / Trapdoor function / Cryptography / Digital signature / Cryptographic hash function

Hierarchical Identity-Based Chameleon Hash and Its Applications Feng Bao1 , Robert H. Deng2 , Xuhua Ding2 , Junzuo Lai2⋆ , and Yunlei Zhao3 1 Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2011-06-01 03:00:45
512Information / Database management systems / Database theory / Cryptographic protocols / Advantage / Web search engine / Public-key cryptography / Database / Search engine indexing / Cryptography / Information science / Information retrieval

Multi-User Private Queries over Encrypted Databases Y.J. Yang* Institute for Infocomm Research, Singapore[removed]E-mail: [removed]

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2009-11-04 01:03:12
513Database management systems / Public-key cryptography / Advantage / Web search engine / Database / ID-based encryption / Search engine indexing / Information science / Information retrieval / Cryptography

Private Query on Encrypted Data in Multi-User Settings Feng Bao1 , Robert H. Deng2 , Xuhua Ding2 , and Yanjiang Yang1,2 1 Institute for Infocomm Research, Singapore [removed]

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-02-28 02:55:29
514Public-key cryptography / Electronic commerce / Advantage / XTR / Dolev-Yao model / RSA / CMAC / Ciphertext indistinguishability / Universal composability / Cryptography / Cryptographic protocols / Finite fields

Modular Code-Based Cryptographic Verification Cédric Fournet Markulf Kohlweiss Pierre-Yves Strub

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-08-23 11:52:17
515Regulation of Investigatory Powers Act / Key escrow / Information security / Key / Digital signature / Cryptography / Key management / Public-key cryptography

The Regulation of Investigatory Powers Bill The Foundation for Information Policy Research The Regulation of Investigatory Powers Bill – The Provisions for Government Access to Keys

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2004-02-15 08:31:33
516Probabilistic complexity theory / Cryptographic protocols / Computational complexity theory / Randomness / Complexity classes / Salil Vadhan / Zero-knowledge proof / Probabilistically checkable proof / Pseudorandomness / Theoretical computer science / Applied mathematics / Cryptography

Research Statement Salil Vadhan September 2006

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English - Date: 2009-08-20 14:10:08
517Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP)

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
518Money / Payment systems / Computing / Financial cryptography / Monetary reform / Electronic money / Ven / Local currency / Bit / Software / Bitcoin / Peer-to-peer computing

Bitcoin: An unrecognized brand in search of an image Primer Research, Inc.

Add to Reading List

Source URL: www.v-primer.com

Language: English - Date: 2013-12-18 12:55:26
519RSA / Digital signature / Verifiable secret sharing / XTR / Group signature / Index of cryptography articles / Cryptography / Public-key cryptography / Random oracle

Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
520Formal sciences / Computational complexity theory / Discrete mathematics / Combinatorics / Algorithm / Combinatorial optimization / Cryptography / Representation theory / Mathematical optimization / Applied mathematics / Mathematics / Theoretical computer science

Part C: New cluster plans 1 Research plan 1.1 The different research themes

Add to Reading List

Source URL: www.math.leidenuniv.nl

Language: English - Date: 2011-09-05 11:05:51
UPDATE