Cryptosystem

Results: 355



#Item
231Cramer–Shoup cryptosystem / Malleability / Optimal asymmetric encryption padding / ElGamal encryption / Chosen-plaintext attack / RSA / Cipher / Adaptive chosen-ciphertext attack / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
232Encryption / Cipher / Cryptosystem / Key / Probabilistic encryption / Index of cryptography articles / Cryptography / Public-key cryptography / ID-based encryption

C:/Documents and Settings/msah010/Desktop/THESIS/important!!/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-09-24 07:55:50
233Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.occ.treas.gov

Language: English - Date: 2014-10-06 11:45:48
234RSA / Ciphertext / Advantage / Cipher / Key / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Deterministic encryption

A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 10:44:19
235Cryptographic protocols / Ciphertext indistinguishability / ProVerif / ElGamal encryption / Digital signature / Cramer–Shoup cryptosystem / RSA / Cryptographic primitive / Computer security / Cryptography / Public-key cryptography / Electronic commerce

MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational Proofs

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-09-28 08:57:21
236Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
237PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
238Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2004-11-10 12:15:25
239Finite fields / Logarithms / Computational hardness assumptions / Group theory / Diffie–Hellman problem / Index calculus algorithm / Discrete logarithm / XTR / Elliptic curve cryptography / Abstract algebra / Cryptography / Mathematics

The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm,

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2014-06-04 21:00:21
240Key management / Paillier cryptosystem / Ciphertext indistinguishability / ElGamal encryption / Adaptive chosen-ciphertext attack / Hybrid cryptosystem / Cryptography / Public-key cryptography / Key encapsulation

Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:20
UPDATE