Cryptology

Results: 302



#Item
291Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
292Public-key cryptography / Publicly Verifiable Secret Sharing / Finite fields / Verifiable secret sharing / Secret sharing / ElGamal encryption / Diffie–Hellman key exchange / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Cryptography / Cryptographic protocols / Computational hardness assumptions

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09
293Cryptanalysis / Cryptology / Symbol / Cryptography / Physics / Analysis / Nicomachean Ethics / Code / Science / Knowledge / Ethology

Author manuscript, published in "Studies in History and Philosophy of Sciences[removed]289." Fran¸cois Vi`ete

Add to Reading List

Source URL: halshs.archives-ouvertes.fr

Language: English - Date: 2013-09-03 09:37:20
294COMP128

T[removed]Special Course on Cryptology A3/A8 & COMP128

Add to Reading List

Source URL: www.tcs.hut.fi

Language: English - Date: 2004-11-21 18:28:51
    295Trivium / RC4 / Grain / Phelix / A5/1 / Linear cryptanalysis / MICKEY / E0 / Cipher / Stream ciphers / Cryptography / Keystream

    Two Trivial Attacks on Trivium Alexander Maximov and Alex Biryukov Laboratory of Algorithmics, Cryptology and Security

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-02-01 09:50:27
    296Salsa20 / Rabbit / Trivium / MICKEY / F-FCSR / Py / Grain / ECRYPT / HC-256 / Stream ciphers / ESTREAM / SOSEMANUK

    ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2009-10-16 12:50:43
    297RSA / Cryptographic hash function / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

    J. Cryptology[removed]: 35–67 © 1996 International Association for

    Add to Reading List

    Source URL: www.estatistica.br

    Language: English - Date: 2003-11-07 12:28:34
    298Security / Bitting / Key / Lock / Cylinder lock / Pin tumbler lock / Combination lock / Padlock / Warded lock / Locksmithing / Locks / Security engineering

    Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze

    Add to Reading List

    Source URL: www.crypto.com

    Language: English - Date: 2003-03-10 20:37:31
    299Dining cryptographers problem / Connected component / Tree / Induced path / Vertex / Public-key cryptography / Graph / Graph theory / Mathematics / Cryptography

    J. Cryptology[removed]:[removed]Journal of Cryptology

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2007-03-31 14:33:35
    300ID-based encryption / RSA / Group signature / Asiacrypt / Eurocrypt / Index of cryptography articles / Diffie–Hellman problem / Cryptography / Public-key cryptography / International Cryptology Conference

    PDF Document

    Add to Reading List

    Source URL: www.cs.ucdavis.edu

    Language: English - Date: 2013-09-18 16:03:32
    UPDATE