ElGamal encryption

Results: 138



#Item
21Cryptographic protocols / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / XTR / Discrete logarithm / ElGamal encryption / Subliminal channels / RSA / Cryptography / Computational hardness assumptions / Finite fields

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Add to Reading List

Source URL: book.huihoo.com

Language: English - Date: 2006-07-27 09:21:33
22ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
23Homomorphic encryption / Paillier cryptosystem / Deterministic encryption / HTTP Secure / ElGamal encryption / Encryption software / RSA / Cryptography / Public-key cryptography / Cryptographic software

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
24Stream ciphers / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / ElGamal encryption / Key / Cryptanalysis / RSA / Cryptography / Public-key cryptography / Key management

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
25PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
26Ciphertext / RSA / Cipher / Semantic security / Paillier cryptosystem / ElGamal encryption / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
27Paillier cryptosystem / Homomorphic encryption / Goldwasser–Micali cryptosystem / Learning with errors / Oblivious transfer / RSA / XTR / ElGamal encryption / Random self-reducibility / Cryptography / Public-key cryptography / Electronic commerce

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
28ElGamal encryption / Cryptography / Public-key cryptography / RSA

This article has been accepted for publication by ISPEC 2014, but has not been fully edited. Content may change prior to final publication. Citation information: DOI: , ISPEC 2014: Th

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-20 04:52:56
29Advantage / Project Nike / ElGamal encryption / Diffie–Hellman key exchange / Ciphertext indistinguishability / Standard model / Random oracle / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Public-key cryptography / Cryptographic protocols

Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 16:38:11
30RSA / ElGamal encryption / XTR / Naccache–Stern cryptosystem / Homomorphic encryption / Cryptography / Public-key cryptography / Paillier cryptosystem

A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:06:04
UPDATE