Cryptosystem

Results: 355



#Item
271Mathematics / Applied mathematics / RSA / Lattice problem / Ciphertext indistinguishability / Ciphertext / Mathematical sciences / Rabin cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Multi-Bit Cryptosystems based on Lattice Problems Akinori Kawachi∗ Keisuke Tanaka∗ Keita Xagawa∗ Abstract We propose multi-bit versions of several single-bit cryptosystems based on lattice problems, the error-free

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:00
272Cyberwarfare / RSA / Espionage / Paillier cryptosystem / Cipher / Security / Public-key cryptography / Cryptography / Chosen-ciphertext attack

Published in H. Krawczyk, Ed., Public Key Cryptography − PKC 2014, vol[removed]of Lecture Notes in Computer Science, pp. 592–610, Springer, 2014. Traceable Group Encryption Benoˆıt Libert1 , Moti Yung2 , Marc Joye1 ,

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:33:43
273Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
274Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
275Finite fields / Computational hardness assumptions / Group theory / Key management / Elliptic curve cryptography / Elliptic curve / Integer factorization / Key size / Elliptic Curve DSA / Abstract algebra / Cryptography / Mathematics

Certicom ECC Challenge Abstract Certicom is pleased to present the Certicom Elliptic Curve Cryptosystem (ECC) Challenge. The first of its kind, the ECC Challenge has been developed to increase the industry’s understand

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2008-02-26 14:48:25
276Cryptographic protocols / Threshold cryptosystem / Electronic commerce / Group signature / Secret sharing / ElGamal signature scheme / Verifiable secret sharing / Digital signature / ElGamal encryption / Cryptography / Public-key cryptography / Key management

562 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18,

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:18:45
277Cryptographic protocols / Computational complexity theory / IP / Homomorphic encryption / Paillier cryptosystem / Communication complexity / One-way function / Polynomial / Oblivious transfer / Cryptography / Theoretical computer science / Applied mathematics

Efficient Private Matching and Set Intersection Michael J. Freedman1? , Kobbi Nissim2?? , and Benny Pinkas3 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:04
278Paillier cryptosystem / Deterministic encryption / PostgreSQL / Query optimizer / Column / Select / Bitmap index / Query plan / Initialization vector / Cryptography / Data management / Homomorphic encryption

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: db.csail.mit.edu

Language: English - Date: 2013-03-28 09:28:30
279NTRUEncrypt / NTRU / RSA / Elliptic curve cryptography / PKCS / NTRU Cryptosystems /  Inc. / NTRUSign / Cryptography / Post-quantum cryptography / Public-key cryptography

The NTRU Cryptosystem: Implementation and Comparative Analysis Semester Project ECE 646, Fall 2001 Professor Kris Gaj

Add to Reading List

Source URL: teal.gmu.edu

Language: English - Date: 2006-08-01 02:21:35
280Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
UPDATE