Cryptosystem

Results: 355



#Item
201Cyberwarfare / Electronic commerce / Security / Applied mathematics / Paillier cryptosystem / ElGamal encryption / Semantic security / Malleability / RSA / Cryptography / Public-key cryptography / Homomorphic encryption

Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan University of Toronto Abstract— A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypte

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2011-09-08 00:17:47
202MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
203Digital signature / X.509 / Certificate server / Cryptosystem / Key server / Key / Public key infrastructure / Key authentication / Cryptography / Key management / Public-key cryptography

PKI - Sham or Salvation? Chair - Jon David Lehman Brothers Panelists Padgett Peterson Lockheed-Martin Tim Polk

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
204Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Bruce Schneier / Cryptography / Cipher / SHA-1

Draft revision: ea089c8[removed]:11:44 +0100) Aaron Kaplan Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ul

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
205Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2014-12-01 16:41:53
206RSA / Prime number / Applied mathematics / Schmidt–Samoa cryptosystem / Benaloh cryptosystem / Public-key cryptography / Electronic commerce / Mathematics

13 RSA Encryption The mathematics behind the very successful RSA encryption method is very simple and uses mainly Euler’s congruence for any N ≥ 1:

Add to Reading List

Source URL: www.math.caltech.edu

Language: English - Date: 2001-05-04 18:10:28
207Mathematics / PKC / Quadratic equation / Reed–Solomon error correction

New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over F2 Masao KASAHARA ∗

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-11 06:26:48
208Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
209Key / Crypt / Science / Knowledge / Cryptography / Password / Cryptosystem

Smartphones set out to decipher a cryptographic system

Add to Reading List

Source URL: phys.org

Language: English - Date: 2014-11-29 21:09:38
210Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.ots.treas.gov

Language: English - Date: 2014-11-23 08:49:36
UPDATE