Cryptosystem

Results: 355



#Item
161Analytic number theory / Modular form / Moduli theory / Quotient group / Algebraic number field / Normal subgroup / Matrix / Spectral theory of ordinary differential equations / Representation theory of finite groups / Abstract algebra / Algebra / Group theory

3-2 A Functional Cryptosystem Using a Group Action YAMAMURA Akihiro The main purpose of this paper is to examine applications of group theoretical concepts to cryptography. We construct a backward deterministic system em

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:57:46
162Decisional Diffie–Hellman assumption / Paillier cryptosystem / XTR / RSA / ElGamal encryption / Cryptography / Public-key cryptography / Oblivious transfer

4-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:55
163Quantum cryptography / Quantum information science / Quantum key distribution / Quantum computer / Photon / Quantum information / Public-key cryptography / Cryptosystem / Optical fiber / Physics / Cryptography / Theoretical computer science

3-2 Secure Communication with Quantum Cryptography HASEGAWA Toshio, NISHIOKA Tsuyoshi, ISHIZUKA Hirokazu, NAMBU Yoshihiro, TOMITA Akihisa, and TAJIMA Akio Quantum cryptography, which has the advantage of being able to de

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2006-11-20 07:55:22
164Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
165Paillier cryptosystem / Deterministic encryption / PostgreSQL / Query optimizer / Column / Select / Bitmap index / Query plan / Initialization vector / Cryptography / Data management / Homomorphic encryption

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
166Number theory / RSA / Modular arithmetic / Chinese remainder theorem / Merkle–Hellman knapsack cryptosystem / XTR / Public-key cryptography / Mathematics / Electronic commerce

Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger [removed] Hovav Shacham [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-25 20:05:34
167ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
168RSA / Blum–Goldwasser cryptosystem / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-08-19 00:17:43
169Cryptanalysis / Cipher / Symmetric-key algorithm / Block cipher / SHA-1 / NIST hash function competition / Cryptosystem / Transport Layer Security / Lattice-based cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

IS2: Guidelines for Authors

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-06-09 08:32:09
170Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-05-13 22:32:41
UPDATE