Cryptosystem

Results: 355



#Item
311Cryptography standards / Integer factorization algorithms / RSA / PKCS1 / PKCS / Optimal asymmetric encryption padding / Integer factorization / Rabin cryptosystem / Digital signature / Cryptography / Public-key cryptography / Key management

Evaluation of Security Level of Cryptography: RSA-OAEP, RSA-PSS, RSA Signature Alfred Menezes

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
312Applied mathematics / Security / Paillier cryptosystem / Cryptosystem / ElGamal encryption / Ciphertext / RSA / BRIC / Homomorphic encryption / Public-key cryptography / Cryptography / Cyberwarfare

BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2004-03-29 07:38:52
313Merkle–Hellman knapsack cryptosystem / Knapsack problem / Rabin cryptosystem / Cryptography / Public-key cryptography / Lenstra–Lenstra–Lovász lattice basis reduction algorithm

  Kobe University Repository : Kernel

Add to Reading List

Source URL: www.lib.kobe-u.ac.jp

Language: English
314Post-quantum cryptography / Ø / Acute accent / Goppa code / Mathematics / Applied mathematics / Notation / ISO/IEC / C1 Controls and Latin-1 Supplement / Public-key cryptography / Electronic commerce / McEliece cryptosystem

Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:38
315RSA / Strong RSA assumption / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Cipher / Plaintext-aware encryption / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / RSA problem

RSA Problem Ronald L. Rivest, MIT Laboratory for Computer Science [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2003-12-18 14:24:00
316RSA / XTR / Three-pass protocol / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

I. Introduction Programming Techniques

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:29:00
317Data Encryption Standard / Group action / XTR / Permutation / Three-pass protocol / Naccache–Stern cryptosystem / Cryptography / Abstract algebra / Finite fields

Is the Data Encryption Standard a group? (Results of cycling experiments on DES)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:24:32
318Public-key cryptography / Finite fields / XTR / Knapsack problem / Merkle–Hellman knapsack cryptosystem / Vector space / Lattice problem / NTRUEncrypt / Three-pass protocol / Mathematics / Algebra / Cryptography

A knapsack-type public key cryptosystem based on arithmetic in finite fields - Information Theory, IEEE Transactions on

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:23:31
319Private information retrieval / Electronic commerce / Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Communication complexity / RSA / XTR / Cryptography / Cryptographic protocols / Public-key cryptography

A Survey of Single-Database PIR: Techniques and Applications Rafail Ostrovsky∗

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2007-09-07 16:17:00
320RSA / Fault injection / Probabilistic encryption / Advanced Encryption Standard / Paillier cryptosystem / Side channel attack / Computer security / Initialization vector / Cryptography / Public-key cryptography / Electronic commerce

Author manuscript, published in "Fault Diagnosis and Tolerance in Cryptography, Santa Barbara : United States (2010)" DOI : [removed]FDTC[removed]

Add to Reading List

Source URL: hal.archives-ouvertes.fr

Language: English - Date: 2010-11-11 06:25:51
UPDATE