Cryptosystem

Results: 355



#Item
261Public-key cryptography / Fortezza / Whitfield Diffie / Cryptosystem / Cryptography / Cryptographic software / Capstone

LYNKS Privacy Card Security Policy LYNKS Privacy Card Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
262Semantic security / XTR / ID-based encryption / Security / Applied mathematics / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Cyberwarfare

Witness Encryption from Instance Independent Assumptions Craig Gentry IBM Research, T.J. Watson [removed] Allison Bishop Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-30 01:07:28
263Rabin cryptosystem / RSA / Cipher / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

The BlueJay Ultra-Lightweight Hybrid Cryptosystem Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 300 Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
264Electronic commerce / Cryptosystem / Dynamic time warping / Biometrics / Digital signature / RSA / Key generation / Cryptography / Public-key cryptography / Key management

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-02-04 03:16:50
265Group theory / Public-key cryptography / Representation theory / Lie groups / McEliece cryptosystem / Niederreiter cryptosystem / Hidden subgroup problem / Permutation / Group representation / Abstract algebra / Algebra / Mathematics

The McEliece Cryptosystem Resists Quantum Fourier Sampling Attack Cristopher Moore University of New Mexico and the Santa Fe Institute Joint work with

Add to Reading List

Source URL: tuvalu.santafe.edu

Language: English - Date: 2011-04-14 11:01:36
266Cryptanalysis / Key / Advanced Encryption Standard / Cipher / Data Encryption Standard / Public-key cryptography / Stream cipher / Outline of cryptography / Index of cryptography articles / Cryptography / Cryptosystem / Block cipher

Cryptographic Algorithms Revealed Greg Rose [removed] Apr-14-09

Add to Reading List

Source URL: seer-grog.net

Language: English - Date: 2009-04-14 12:48:05
267Cipher / SHA-1 / Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Cryptography / Mathematical sciences / Science

Draft revision: 3f5ad4f[removed]:38:47 +0200) Pepi Zawodsky Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, U

Add to Reading List

Source URL: bettercrypto.org

Language: English - Date: 2014-06-21 11:07:34
268Electronic commerce / Proof of knowledge / Lattice problem / RSA / Zero-knowledge proof / IP / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

ISSN[removed]Research Reports on Mathematical and Computing Sciences

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:07
269Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
270NTRUSign / GGH signature scheme / Goldwasser–Micali cryptosystem / NTRU / ElGamal encryption / Quantum computer / Lattice / Lattice-based cryptography / Learning with errors / Cryptography / Post-quantum cryptography / Lattice problem

A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:00
UPDATE