Cryptosystem

Results: 355



#Item
31An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo	 
 carlos @ lacnic.net

An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo carlos @ lacnic.net

Add to Reading List

Source URL: www.labs.lacnic.net

Language: English - Date: 2011-09-08 15:41:30
32Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
331  A “Differential” Attack on Polly Cracker Dennis Hofheinz and Rainer Steinwandt Abstract— We describe an attack on the public key cryptosystem Polly Cracker for which it is not necessary to know a superset of the

1 A “Differential” Attack on Polly Cracker Dennis Hofheinz and Rainer Steinwandt Abstract— We describe an attack on the public key cryptosystem Polly Cracker for which it is not necessary to know a superset of the

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:39
    34FACTORIZATION TECHNIQUES ELVIS NUNEZ AND CHRIS SHAW Abstract. The security of the RSA public key cryptosystem relies upon the computational difficulty of deriving the factors of a particular semiprime modulus. In this pa

    FACTORIZATION TECHNIQUES ELVIS NUNEZ AND CHRIS SHAW Abstract. The security of the RSA public key cryptosystem relies upon the computational difficulty of deriving the factors of a particular semiprime modulus. In this pa

    Add to Reading List

    Source URL: davidlowryduda.com

    Language: English - Date: 2016-05-25 03:59:31
    35This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

    This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-02-21 09:51:42
    36Code-based Cryptography  Christiane Peters Technical University of Denmark  ECC 2011

    Code-based Cryptography Christiane Peters Technical University of Denmark ECC 2011

    Add to Reading List

    Source URL: ecc2011.loria.fr

    Language: English - Date: 2011-09-30 12:40:04
    37This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

    This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-02-21 09:51:42
    38Bug Attacks Eli Biham1 Yaniv Carmeli1  Adi Shamir2

    Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

    Add to Reading List

    Source URL: iacr.org

    Language: English - Date: 2010-11-05 17:58:40
    39Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher  Simon Duquennoy

    Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English - Date: 2015-09-17 04:43:33