Cryptosystem

Results: 355



#Item
321Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2004-10-22 12:01:39
322Key size / Cryptanalysis / Key / Symmetric-key algorithm / Cryptosystem / RSA / Brute-force attack / Block cipher / Data Encryption Standard / Cryptography / Key management / Public-key cryptography

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08
323Proofs of quadratic reciprocity / Okamoto–Uchiyama cryptosystem / Finite fields / Algebraic number theory / Mathematics

Carmichael numbers with three prime factors Notes by G.J.O. Jameson These notes are expository, not a research article. However, the estimations of f3 (p)

Add to Reading List

Source URL: www.maths.lancs.ac.uk

Language: English - Date: 2011-12-20 05:42:08
324Private information retrieval / Computational complexity theory / Paillier cryptosystem / Oblivious transfer / Time complexity / XTR / Cryptography / Cryptographic protocols / Public-key cryptography

An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-07-05 16:22:56
325Mathematics / Notation / Goppa code / BCH code / Cyclic code / Code / Forward error correction / Valery Goppa / McEliece cryptosystem / Coding theory / Finite fields / Error detection and correction

PDF Document

Add to Reading List

Source URL: infosec.seu.edu.cn

Language: English - Date: 2010-09-29 22:29:40
326Public-key cryptography / Hidden Field Equations / Multivariate cryptography / QUAD / XTR / Trapdoor function / RSA / Index of cryptography articles / Benaloh cryptosystem / Cryptography / Post-quantum cryptography / Finite fields

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-04-04 07:06:39
327Gustave Solomon / Information / Forward error correction / McEliece cryptosystem / Reed–Solomon error correction / Convolutional code / BCH code / Elwyn Berlekamp / Cyclic code / Error detection and correction / Coding theory / Mathematics

PDF Document

Add to Reading List

Source URL: backup.itsoc.org

Language: English - Date: 2006-08-07 11:53:23
328Modular arithmetic / Integer factorization algorithms / Public-key cryptography / Quadratic residue / Quadratic sieve / Square root / Root-finding algorithm / Methods of computing square roots / Rabin cryptosystem / Mathematics / Number theory / Abstract algebra

PDF Document

Add to Reading List

Source URL: www.securecottage.com

Language: English - Date: 2012-11-12 18:27:07
329Cryptosystem / Digital signature / Key / Index of cryptography articles / One-way function / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2012-05-25 23:13:48
330History of video games / Video game publishers / Humanities / Nintendo Wi-Fi Connection / Wi-Fi / Wii / Nintendo / Game Boy Advance / Book:Nintendo consoles / Nintendo DS / Handheld game consoles / Computer hardware

PDF Document

Add to Reading List

Source URL: cryptosystem.org

Language: English - Date: 2006-05-09 20:36:54
UPDATE