Cryptosystem

Results: 355



#Item
281Modular arithmetic / Public-key cryptography / Euclidean algorithm / Merkle–Hellman knapsack cryptosystem / Linear congruence theorem / Quadratic residue / Affine cipher / Classical cipher / Cryptography / Mathematics / Number theory

A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations" S.R. Blackburn, S. Murphyyand K.G. Patersonz Information Security Group, Royal Holloway, University of London, Surrey TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:34
282Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
283Cyberwarfare / RSA / Espionage / Paillier cryptosystem / Cipher / Security / Public-key cryptography / Cryptography / Chosen-ciphertext attack

Published in H. Krawczyk, Ed., Public Key Cryptography − PKC 2014, vol[removed]of Lecture Notes in Computer Science, pp. 592–610, Springer, 2014. Traceable Group Encryption Benoˆıt Libert1 , Moti Yung2 , Marc Joye1 ,

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:33:43
284Cyberwarfare / ID-based encryption / Ciphertext / ElGamal encryption / Hybrid cryptosystem / RSA / Cipher / Access control / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner† and Peter Steenkiste†‡ † Computer Science Department ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-06-27 14:38:48
285ElGamal encryption / RSA / Homomorphic encryption / Ordinal number / Applied mathematics / Public-key cryptography / Mathematics / Paillier cryptosystem

Solving the Discrete Logarithm Problem for Packing Candidate Preferences James Heather1 , Chris Culnane1 , Steve Schneider1 , Sriramkrishnan Srinivasan and Zhe Xia2 * 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
286Key size / Key / RSA / Paillier cryptosystem / Homomorphic encryption / NTRU / Block cipher / Scantegrity / Electronic voting / Cryptography / Public-key cryptography / Key management

On Key-Sizes for Electronic Voting Sriramkrishnan Srinivasan Chris Culnane James Heather Zhe Xia

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
287Quantum information science / Post-quantum cryptography / Theoretical computer science / Quantum cryptography / Lattice problem / Quantum computer / Quantum algorithm / McEliece cryptosystem / Qubit / Cryptography / Mathematics / Applied mathematics

Post-Quantum Signatures Johannes Buchmann Carlos Coronado Daniela Engelbert

Add to Reading List

Source URL: itslab.csce.kyushu-u.ac.jp

Language: English - Date: 2012-07-09 05:17:42
288Cryptographic protocols / Post-quantum cryptography / Elliptic curve cryptography / NTRU / Outline of cryptography / Cryptanalysis / Lattice-based cryptography / Alice and Bob / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Finite fields

Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:45:18
289Deterministic encryption / RSA / Cipher / One-time pad / Encryption / Authenticated encryption / Ciphertext indistinguishability / Cramer–Shoup cryptosystem / Cryptography / Semantic security / Ciphertext stealing

CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-13 00:34:50
UPDATE