Cryptosystem

Results: 355



#Item
251CRYPTREC / NESSIE / Cryptosystem / Hierocrypt / SC2000 / Cryptographic hash function / CIPHERUNICORN-A / CIPHERUNICORN-E / Symmetric-key algorithm / Cryptography / Cryptography standards / Block ciphers

CRYPTREC[removed]CRYPTREC Report[removed]Provisional Translation) March 2001

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:25
252Semantic security / Hybrid cryptosystem / Integrated Encryption Scheme / Random oracle / Key encapsulation / Standard model / Cryptography / Public-key cryptography / CRYPTREC

Report on Present State of PSEC-KEM Cryptosystem Evaluation (screening evaluation) January 28, 2002 Natsume Matsuzaki, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
253Cryptography / Cryptosystem / Mathematical sciences / Mathematics / Science / Public-key cryptography / Optimal asymmetric encryption padding / RSA

Report on Present State of HIME(R) Cryptosystem Evaluation (screening evaluation) January 28, 2002 Seigo Arita, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
254Electronic commerce / RSA / PKCS1 / PKCS / Optimal asymmetric encryption padding / Digital signature / Cryptographic primitive / Cryptosystem / CRYPTREC / Cryptography / Public-key cryptography / Cryptography standards

Report on Present State of RSA Cryptosystem/Signature Evaluation (full evaluation) January 28, 2002 Kazuo Ohta, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
255RSA / Cryptosystem / Key / Hybrid cryptosystem / Ciphertext indistinguishability / Index of cryptography articles / RSA problem / Cryptography / Public-key cryptography / Electronic commerce

Report on Present State of EPOC-2 Cryptosystem Evaluation (full evaluation) January 28, 2002 Hajime Watanabe, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
256Ciphertext indistinguishability / Cipher / Espionage / Security / Cramer–Shoup cryptosystem / Integrated Encryption Scheme / Cryptography / Cyberwarfare / ID-based encryption

Why Proving HIBE Systems Secure is Difficult Allison Lewko Brent Waters Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-17 14:00:59
257RSA / XTR / Ciphertext / ID-based encryption / Running key cipher / Cipher / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-08 21:20:23
258Random oracle / Digital signature / Standard model / RSA / Cramer–Shoup cryptosystem / Public key certificate / Strong RSA assumption / Advantage / BLS / Cryptography / Public-key cryptography / Group signature

Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-08 16:56:54
259Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
UPDATE