Cryptosystem

Results: 355



#Item
1An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ ur Experimentelle Mathematik, Universit¨ at Duisburg-Essen, Germany and

An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ ur Experimentelle Mathematik, Universit¨ at Duisburg-Essen, Germany and

Add to Reading List

Source URL: www.mathematik.uni-leipzig.de

Language: English - Date: 2012-06-01 09:23:20
    2Communication services empowered with a classical chaos based cryptosystem G. Vidal 1  Institute of Physics

    Communication services empowered with a classical chaos based cryptosystem G. Vidal 1 Institute of Physics

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2013-03-27 20:42:00
      3FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

      FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

      Add to Reading List

      Source URL: www.math.fau.edu

      Language: English - Date: 2018-04-24 10:30:54
        4Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

        Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:43:59
          5Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa University of Tartu, Tartu, Estonia Abstract. Given a well-chosen additively homomorphic cryptosystem and a ⌃ protocol with linear answer, Damg˚

          Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa University of Tartu, Tartu, Estonia Abstract. Given a well-chosen additively homomorphic cryptosystem and a ⌃ protocol with linear answer, Damg˚

          Add to Reading List

          Source URL: fc17.ifca.ai

          - Date: 2017-03-17 12:03:55
            6NTRU: A PUBLIC KEY CRYPTOSYSTEM NTRU Cryptosystems, Inc. (www.ntru.com) Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman

            NTRU: A PUBLIC KEY CRYPTOSYSTEM NTRU Cryptosystems, Inc. (www.ntru.com) Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman

            Add to Reading List

            Source URL: grouper.ieee.org

            - Date: 2008-04-27 09:53:40
              7True Key™ by Intel Security Security White Paper 2.0 Table of Contents Introduction ................................................1 Cryptosystem .............................................1

              True Key™ by Intel Security Security White Paper 2.0 Table of Contents Introduction ................................................1 Cryptosystem .............................................1

              Add to Reading List

              Source URL: b.tkassets.com

              - Date: 2016-05-16 11:21:57
                8Contemporary Mathematics  Breaking the Akiyama-Goto cryptosystem Petar Ivanov and Jos´e Felipe Voloch Abstract. Akiyama and Goto have proposed a cryptosystem based on rational points on curves over function fields (stat

                Contemporary Mathematics Breaking the Akiyama-Goto cryptosystem Petar Ivanov and Jos´e Felipe Voloch Abstract. Akiyama and Goto have proposed a cryptosystem based on rational points on curves over function fields (stat

                Add to Reading List

                Source URL: www.ma.utexas.edu

                - Date: 2008-10-31 13:20:26
                  9Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

                  Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

                  Add to Reading List

                  Source URL: zoo.cs.yale.edu

                  - Date: 2013-10-07 23:40:04
                    10The Security of a Mix-Center Based on a Semantically Secure Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

                    The Security of a Mix-Center Based on a Semantically Secure Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

                    Add to Reading List

                    Source URL: www.nada.kth.se

                    - Date: 2012-05-30 08:33:53