Cryptosystem

Results: 355



#Item
191Malleability / Chosen-ciphertext attack / Key encapsulation / Advantage / Public-key cryptography / Hybrid cryptosystem / RSA / Ciphertext / Adaptive chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
192Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
193Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Naccache–Stern cryptosystem / Commitment scheme / ElGamal encryption / Transmission Control Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Verifiable Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa Laboratory for Theoretical CS, Department of CS&E Helsinki University of Technology, P.O.Box 5400, FIN[removed]HUT, Espoo, Finland helger@tc

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
194Finite fields / Electronic commerce / Paillier cryptosystem / Okamoto–Uchiyama cryptosystem / Goldwasser–Micali cryptosystem / XTR / ElGamal encryption / Diffie–Hellman problem / RSA / Cryptography / Public-key cryptography / Computational hardness assumptions

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications Emmanuel Bresson1 , Dario Catalano2 , and David Pointcheval2 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
195Adaptive chosen-ciphertext attack / Tiny Encryption Algorithm / Cryptography / Cramer–Shoup cryptosystem / Chosen-ciphertext attack

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack† Chong Hee KIM, Yong Ho HWANG, and Pil Joong LEE IS Lab, Dept. of Electronic and Electrical Eng., POSTECH, KOREA {chhkim,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
196Paillier cryptosystem / RSA / Semantic security / Blum integer / Schmidt–Samoa cryptosystem / Damgård–Jurik cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa1 and Tsuyoshi Takagi2 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
197Zero-knowledge proof / RSA / Goldwasser–Micali cryptosystem / Pseudorandomness / Computational indistinguishability / Index of cryptography articles / Cryptography / Electronic commerce / Public-key cryptography

Microsoft PowerPoint - 2 Crypto

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2010-10-04 17:47:43
198Lattice points / Linear algebra / Computational number theory / Homomorphic encryption / Orthogonality / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice / Private information retrieval / Paillier cryptosystem / Cryptography / Algebra / Mathematics

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 03:49:32
199Quantum cryptography / Quantum information science / Quantum computer / RSA / Quantum mechanics / Cryptosystem / Quantum / Index of cryptography articles / Key size / Cryptography / Theoretical computer science / Applied mathematics

Quantum Cryptography Today and Tomorrow Or How to Make and Break Quantum Cryptosystems (Without Being an Expert in Quantum Mechanics)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:36:05
200RSA / Cipher / XTR / ID-based encryption / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis1 and Brent Waters2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:06:29
UPDATE