Cryptosystem

Results: 355



#Item
21Cryptography / Cryptosystem / RSA / Public-key cryptography / Key / Symmetric-key algorithm / Encryption / Data Encryption Standard / Index of cryptography articles / MerkleHellman knapsack cryptosystem

Microsoft Word - WCECS2009 ICCSA_44 USA CAMERA MAGIC SQUARE ADD_ON SECURIT?

Add to Reading List

Source URL: www.iaeng.org

Language: English - Date: 2009-09-22 22:18:34
22Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:54:04
23Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-01-05 12:45:55
24Mathematical analysis / Mathematics / Functional analysis / IP / Distribution / Computability theory / Linear temporal logic / operator

A Note on the Malleability of the El Gamal Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:38:02
25Cryptonomicon / The Baroque Cycle / Solitaire / SIGCSE / Cryptosystem

The Somewhat Simplified Solitaire Algorithm Lester I. McCann Computer Science Department

Add to Reading List

Source URL: nifty.stanford.edu

Language: English - Date: 2006-02-28 18:48:14
26Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
27Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
28Public-key cryptography / Public key infrastructure / RSA / Schmidt-Samoa cryptosystem

Answers to Practice Questions for Exam 1 (Crypto Basics) Answer 1-Crypto: a) The three basic requirements that we discussed in class are: 1. Cryptosystem security: Roughly speaking, it must be infeasible for an eavesdrop

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-10-15 14:07:47
29ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
30Paillier cryptosystem / RSA / Semantic security / XTR

LNCSAn Adaptively Secure Mix-Net Without Erasures

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:48:38
UPDATE