Cryptosystem

Results: 355



#Item
331Financial cryptography / Blind signature / Peer-to-peer / Digital signature / Threshold cryptosystem / Social peer-to-peer processes / PKCS / RSA / Bootstrapping node / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-02-15 17:51:33
332Modular arithmetic / Quadratic residue / Cryptographic protocols / Algebraic number theory / Zero-knowledge proof / Blum integer / Goldwasser–Micali cryptosystem / Quadratic reciprocity / Mathematics / Abstract algebra / Cryptography

PDF Document

Add to Reading List

Source URL: www.gilith.com

Language: English - Date: 2009-07-21 15:32:35
333Claw-free permutation / Goldwasser–Micali cryptosystem / One-way function / Probabilistic encryption / ElGamal encryption / Polynomial / XTR / Ideal lattice cryptography / Paillier cryptosystem / Cryptography / Homomorphic encryption / Commitment scheme

PDF Document

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2005-05-15 21:11:58
334Ciphertext indistinguishability / Paillier cryptosystem / Semantic security / Threshold cryptosystem / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / ElGamal encryption / RSA / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-05-19 13:27:55
335Homomorphic encryption / Malleability / Blind signature / RSA / Semantic security / Digital signature / Damgård–Jurik cryptosystem / Benaloh cryptosystem / Cryptography / Public-key cryptography / Paillier cryptosystem

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2002-11-19 09:06:37
336ElGamal encryption / Ciphertext / RSA / Cipher / Paillier cryptosystem / Multiple encryption / Authenticated encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Proxy re-encryption

PDF Document

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2005-02-04 17:13:07
337Goppa code / Gilbert–Varshamov bound / Linear code / Singleton bound / McEliece cryptosystem / Reed–Solomon error correction / Generator matrix / Code / Alternant code / Coding theory / Mathematics / Notation

PDF Document

Add to Reading List

Source URL: orion.math.iastate.edu

Language: English - Date: 2004-12-20 17:36:38
338Finite fields / Reed–Solomon error correction / List decoding / Cardinal number / XTR / Commitment scheme / Berlekamp–Massey algorithm / McEliece cryptosystem / Cryptography / Error detection and correction / Coding theory

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-08-25 15:50:05
339Cipher / Meet-in-the-middle attack / Key size / Triple DES / RSA / Block cipher / Cryptanalysis / Multiple encryption / Rabin cryptosystem / Cryptography / Public-key cryptography / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-20 06:17:58
340Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-10-07 02:19:01
UPDATE