Cryptosystem

Results: 355



#Item
171Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-05 20:38:47
172Cryptosystem / Symmetric-key algorithm / Cryptography / Iris recognition / Cipher

Microsoft Word - Noore-IJSP-Revised.doc

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
173Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
174Quantum information science / McEliece cryptosystem / Cryptography / Post-quantum cryptography / Quantum cryptography

Accepted Papers-Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-17 11:08:13
175Machine learning / Cryptography / Ensemble learning / Homomorphic encryption / Paillier cryptosystem / AdaBoost / Naive Bayes classifier / Linear classifier / Perceptron / Statistics / Statistical classification / Public-key cryptography

Machine Learning Classification over Encrypted Data Raphael Bost Raluca Ada Popa Stephen Tu

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:16:35
176Paillier cryptosystem / Public-key cryptography / ElGamal encryption / Q

Information Security and Computer Fraud, 2013, Vol. 1, No. 1, 1-7 Available online at http://pubs.sciepub.com/iscf/1/1/1 © Science and Education Publishing DOI:[removed]iscf[removed]Simplified Verifiable Re-encryption Mi

Add to Reading List

Source URL: www.sciepub.com

Language: English
177Mathematics / Public-key cryptography / Error detection and correction / Algebra / Post-quantum cryptography / McEliece cryptosystem / Goppa code / Niederreiter cryptosystem / Reed–Solomon error correction / Coding theory / Abstract algebra / Finite fields

Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 08:54:20
178Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-05-29 07:38:50
179ID-based encryption / Advantage / Paillier cryptosystem / Boneh/Franklin scheme / Random oracle / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
180RSA / Peak signal-to-noise ratio / Cryptography / Public-key cryptography / Steganography

[removed]MVA2009 IAPR Conference on Machine Vision Applications, May 20-22, 2009, Yokohama, JAPAN An Optical Video Cryptosystem with Adaptive Steganography Cheng-Hung Chuang

Add to Reading List

Source URL: www.mva-org.jp

Language: English - Date: 2013-11-30 07:20:39
UPDATE