Cryptology

Results: 302



#Item
151Cipher / Mix network / RSA / Block cipher / Chosen-ciphertext attack / Key / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53
152Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
153Group theory / Algorithm / Applied mathematics / Mathematics / Elliptic curves / Analytic number theory

Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity [Cryptology ePrint Archive, ReportBenoˆıt Chevallier-Mames1 , Mathieu Ciet2 , and Marc Joye1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-12 11:22:51
154Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
155Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
156Hashing / Hash function / Digital signature / MD5 / Lamport signature / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 11:58:58
157Numeral systems / Elliptic Curve DSA / Exponentiation / Logarithm / Radix / Precomputation / Elliptic curve cryptography / Exponentiation by squaring / Mathematics / Abstract algebra / Exponentials

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-05-19 15:51:37
158Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
159Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
160SOSEMANUK / Trivium / Rabbit / Grain / HC-256 / MICKEY / CyaSSL / LEX / Computing / Stream ciphers / Salsa20 / ESTREAM

ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-01-19 12:15:12
UPDATE