Cryptosystem

Results: 355



#Item
181Paillier cryptosystem / Electronic commerce / RSA / Cryptography / Public-key cryptography / Homomorphic encryption

Introduction Public Key Compression Approximate-GCD

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
182Cryptographic protocols / Schnorr signature / Digital signature / Random oracle / Fiat-Shamir heuristic / Paillier cryptosystem / Cryptography / Public-key cryptography / Forking lemma

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France 18 April, EUROCRYPT 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
183Malleability / Adaptive chosen-ciphertext attack / Semantic security / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Optimal asymmetric encryption padding / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
184Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-05-22 23:40:41
185RSA / Threshold cryptosystem / Electronic voting / Digital signature / Blind signature / Damgård–Jurik cryptosystem / Cryptography / Public-key cryptography / Paillier cryptosystem

Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC ’[removed] – 29 august 2001, Newport, Rhode Island, USA) N. Shavit Ed. ACM Press, New York, pages 274–283. Practical Multi-Candidate

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:36:02
186Paillier cryptosystem / Public-key cryptography / Relational database management systems / Query languages / SQL / Select / Where / SQL keywords / Data management / Computing

Cloud  encryp-on  –     Encrypt  all  the  things!   Walter  Tighzert   German  Owasp  Day  2014   About  me  

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:47:56
187Mathematics / Homomorphic encryption / Paillier cryptosystem / Electronic commerce / Applied mathematics / Homomorphism / ElGamal encryption / Group homomorphism / RSA / Public-key cryptography / Morphisms / Cryptography

An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623

Add to Reading List

Source URL: www.cs.rit.edu

Language: English - Date: 2011-05-15 17:17:55
188Cryptography / Election fraud / Electoral systems / Voter-verified paper audit trail / Paillier cryptosystem / Voting machine / Voting system / GNU.FREE / Postal voting / Politics / Elections / Electronic voting

An Internet Voting System Supporting User Privacy Aggelos Kiayias University of Connecticut [removed] Michael Korman

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2006-12-20 13:09:28
189Cramer–Shoup cryptosystem / Plaintext-aware encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Ciphertext / ElGamal encryption / RSA / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
190Semantic security / Adaptive chosen-ciphertext attack / Cramer–Shoup cryptosystem / Chosen-ciphertext attack / Advantage / Ciphertext / RSA / Cipher / Key-recovery attack / Cryptography / Signcryption / Ciphertext indistinguishability

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-20 21:27:06
UPDATE