Cryptosystem

Results: 355



#Item
221Communications security / Program Executive Office Command Control Communications Tactical / COMSEC / Cryptosystem / Edgewood Chemical Biological Center / Espionage / Military technology / Cryptography / United States Army / Cyberwarfare

Name: Lauren McNew Username: AMBMcNew, CGMcNew Organization: PD COMSEC, Cryptographic Systems Job Title: Project Lead, In-Line Network Encryption

Add to Reading List

Source URL: www.ecybermission.com

Language: English - Date: 2014-08-05 15:58:33
222Pseudorandom generator / Malleability / Commitment scheme / Semantic security / Provable security / Pseudorandom function family / Secure multi-party computation / Pseudorandom number generator / Cramer–Shoup cryptosystem / Cryptography / Random oracle / One-way function

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
223Hard-core predicate / Randomness extractor / RSA / Rabin cryptosystem / Lattice problem / Trapdoor function / Key size / XTR / Advanced Encryption Standard / Cryptography / One-way function / Learning with errors

Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:05:49
224Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
225Electronic commerce / Cyberwarfare / RSA / Lattice / Learning with errors / ID-based encryption / Applied mathematics / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / Public-key cryptography / Mathematics

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-16 17:16:58
226Electronic commerce / Homomorphic encryption / ElGamal encryption / Learning with errors / Threshold cryptosystem / RSA / Semantic security / Secure multi-party computation / Cipher / Cryptography / Public-key cryptography / Cryptographic protocols

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov∗ Abhishek Jain†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-11 13:30:56
227Finite fields / Electronic commerce / Mathematics / Cyberwarfare / Reed–Solomon error correction / McEliece cryptosystem / Symbol / XTR / Applied mathematics / Public-key cryptography / Post-quantum cryptography / Cryptography

New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 23:59:57
228Ciphertext indistinguishability / Universal composability / Oblivious transfer / Common reference string model / Communications protocol / Secure multi-party computation / Cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
229Cipher / Advantage / RSA / Semantic security / Probabilistic encryption / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Chosen-ciphertext attack

Searchable Keyword-Based Encryption∗ Dong Jin Park† , Juyoung Cha‡ , and Pil Joong Lee‡ † Samsung Electronics Co., Ltd., Korea [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-01-21 22:15:55
230XTR / One-way function / Cramer–Shoup cryptosystem / RSA / Paillier cryptosystem / Advantage / Ideal lattice cryptography / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Finite fields

Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:08:40
UPDATE