Cryptosystem

Results: 355



#Item
101Ciphertext / RSA / Block cipher modes of operation / Cipher / ElGamal encryption / Semantic security / Symmetric-key algorithm / Blum–Goldwasser cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
102Mathematics / Error detection and correction / Finite fields / Applied mathematics / Computing / McEliece cryptosystem / Forward error correction / RSA / Low-density parity-check code / Public-key cryptography / Coding theory / Electronic commerce

Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Aki

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-20 21:26:35
103FIPS 140-2 / NTRU / Cryptosystem / Mathematics / Algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

Joshua Erin Hill Curriculum Vitæ H () – B

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2014-11-09 13:39:22
104Cipher / Mix network / RSA / Block cipher / Chosen-ciphertext attack / Key / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53
105Electronic voting / Election fraud / Electoral systems / Paillier cryptosystem / Ballot / Homomorphic encryption / Blind signature / Electoral fraud / Vote counting system / Cryptography / Politics / Elections

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI

Add to Reading List

Source URL: www.heinz.cmu.edu

Language: English - Date: 2004-05-26 11:53:01
106RSA / Chosen-ciphertext attack / XTR / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Cipher

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-04 04:34:32
107Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
108Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
109Electoral systems / Public-key cryptography / Election fraud / Electronic voting / Threshold cryptosystem / Voting system / Communications protocol / Homomorphic encryption / Electoral fraud / Cryptography / Cryptographic protocols / Information

942 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:48
110Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
UPDATE