Cryptosystem

Results: 355



#Item
91Key management / Post-quantum cryptography / Key size / NTRU / Elliptic curve cryptography / Homomorphic encryption / RSA / McEliece cryptosystem / Key / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 12:49:59
92Religious philosophy / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Mathematics / Philosophy / Forward error correction / Paul Tillich / Low-density parity-check code / Coding theory / Error detection and correction / Public-key cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 11:02:34
93Discrete mathematics / Mathematics / Finite fields / Computer arithmetic / Post-quantum cryptography / Hamming code / McEliece cryptosystem / Cyclic code / Reed–Solomon error correction / Coding theory / Error detection and correction / Information theory

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:13:04
94Chosen-ciphertext attack / Ciphertext / Cipher / RSA / Advantage / Malleability / Ciphertext stealing / Paillier cryptosystem / Cryptography / Authenticated encryption / Block cipher modes of operation

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
95RSA / ElGamal encryption / XTR / Naccache–Stern cryptosystem / Homomorphic encryption / Cryptography / Public-key cryptography / Paillier cryptosystem

A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:06:04
96Ciphertext indistinguishability / RSA / Probabilistic encryption / Oblivious transfer / IP / Index of cryptography articles / Blum–Goldwasser cryptosystem / Cryptography / Electronic commerce / Public-key cryptography

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
97Digital signature / Key / Paillier cryptosystem / Prime number / Threshold cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2013-06-06 21:32:07
98Science / Technology / Mathematical sciences / Cryptography / Cryptosystem / Communications security

Ms. Susan L. Graham Computer Science Division-EECS University of California, Berkeley Berkeley, CaliforniaDear Ms. Graham,

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2010-07-18 17:32:23
99Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
100Key size / Cryptosystem / Encryption / Data Encryption Standard / Key / Smart card / Symmetric-key algorithm / NSA encryption systems / Network Security & Cryptography / Cryptography / Key management / Public-key cryptography

PIN Security Requirements

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:44
UPDATE