Cryptology

Results: 302



#Item
221Lattice-based cryptography / Homomorphic encryption / Symposium on Theory of Computing / International Cryptology Conference / Symposium on Foundations of Computer Science / Asiacrypt / Oblivious transfer / Eurocrypt / Indocrypt / Cryptography / Formal sciences / Post-quantum cryptography

Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-02 00:24:31
222Grants / Research / Knowledge / Electronic submission / International Cryptology Conference / Proceedings / Education / Academic publishing / Competitions / Digital media

CRYPTO 2014 | Call for Papers The 34th Annual International Cryptology Conference August 17-21, [removed], Santa Barbara, CA http://www.iacr.org/conferences/crypto2014/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-01-26 23:03:32
223Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
224Decisional Diffie–Hellman assumption / Mathematics / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Computational Diffie–Hellman assumption / Computational hardness assumptions / Finite fields / Cryptographic protocols

Advances in Cryptology – Proceedings of Crypto ’07 (August 19–[removed], Santa Barbara, CA) A. Menezes Ed. Springer-Verlag, LNCS 4622, pages 482–499. A generalization of DDH with applications to protocol analysis a

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
225Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
226Knowledge / Preprint / Eurocrypt / International Cryptology Conference / Asiacrypt / Scientific literature / ArXiv / Electronic Colloquium on Computational Complexity / Peer review / Publishing / Academic publishing / Academia

Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 1999-08-30 11:43:26
227Science and technology in Turkey / Public safety / Computing / Carnegie Mellon University / Computer emergency response team / Data security / Scientific and Technological Research Council of Turkey / Turkish National Research Institute of Electronics and Cryptology / Information security / Security / Crime prevention / National security

Mehmet ERIS [removed] Tel: ([removed]

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2008-02-04 13:32:12
228MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands [removed] January 29, 2012

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2012-01-29 17:12:55
229Lecture Notes in Computer Science / International Cryptology Conference / Ueli Maurer / Claw-free permutation / Pietrzak / Full Domain Hash / Cryptography / Indocrypt / Eurocrypt

PDF Document

Add to Reading List

Source URL: ist.ac.at

Language: English - Date: 2011-08-16 09:10:29
230International Cryptology Conference / Fellow / International Association for Cryptologic Research

IACR Fellows Program Proposal The Association will establish an IACR Fellows Program to recognize outstanding IACR members for technical and professional contributions that: a) Advance the science, technology, and practi

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2002-09-23 15:40:50
UPDATE