Cryptology

Results: 302



#Item
1Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:38
2Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:55
3Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
4Algebra / Abstract algebra / Mathematics / Group theory / Linear algebra / Pairing-based cryptography / Subgroup / Pairing / XTR / Generalized flag variety

Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
5Cryptography / ECRYPT / Data Encryption Standard / Mathematics

Network of Excellence in Cryptology ISTSpecial Purpose Hardware for Attacking Cryptographic Systems (SHARCS ‘06)

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-17 15:01:59
6Cryptography / E-commerce / RSA / Public-key cryptography / Cryptosystem

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
7Cryptography / Zero-knowledge proof / Proof of knowledge / Malleability / Mathematical proof / Non-interactive zero-knowledge proof / Ciphertext indistinguishability / Homomorphic encryption / FiatShamir heuristic

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
8Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
9Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
10Cryptography / Computational complexity theory / Zero-knowledge proof / Zero knowledge / Interactive proof system / IP / NP / Cryptographic protocol / Proof of knowledge / Oblivious transfer

Cryptology and Its Applications Nordic Research Training course, Bergen Zero knowledge and some applications Helger Lipmaa

Add to Reading List

Source URL: kodu.ut.ee

Language: English - Date: 2008-09-12 11:33:08
UPDATE