ElGamal signature scheme

Results: 32



#Item
11RSA / Finite fields / Elliptic Curve DSA / Diffie–Hellman key exchange / Digital signature / Digital Signature Algorithm / SHA-1 / Subliminal channels / ElGamal signature scheme / Cryptography / Public-key cryptography / Electronic commerce

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
12Subliminal channels / Diffie–Hellman key exchange / Elliptic Curve DSA / Digital signature / Digital Signature Algorithm / One-time pad / ElGamal signature scheme / Random number generator attack / Cryptography / Public-key cryptography / RSA

Cryptographic Insecurity of the Test&Repeat Paradigm

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
13Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-03-01 20:32:14
14Computational hardness assumptions / BLS / Schnorr signature / Forking lemma / Digital signature / XTR / ElGamal encryption / Random oracle / Diffie–Hellman problem / Cryptography / Public-key cryptography / Finite fields

A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
15Field theory / Finite fields / Public-key cryptography / Group theory / Elliptic Curve DSA / Elliptic curve cryptography / Elliptic curve / ElGamal signature scheme / Discrete logarithm / Abstract algebra / Cryptography / Algebra

The Elliptic Curve Digital Signature Algorithm (ECDSA)    

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2009-10-15 20:03:40
16Applied mathematics / RSA / Security / Digital signature / Rabin signature algorithm / ElGamal signature scheme / Public-key cryptography / Cryptography / Cyberwarfare

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
17Lamport signature / Signature / Ergo Proxy / Blind signature / ElGamal signature scheme / Cryptography / Group signature / Digital signature

Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
18Finite fields / Verifiable secret sharing / Digital signature / Secret sharing / XTR / Random oracle / RSA / Group signature / ElGamal signature scheme / Cryptography / Public-key cryptography / Key management

An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:18
19NTRUSign / GGH signature scheme / Goldwasser–Micali cryptosystem / NTRU / ElGamal encryption / Quantum computer / Lattice / Lattice-based cryptography / Learning with errors / Cryptography / Post-quantum cryptography / Lattice problem

A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:00
20ElGamal signature scheme / Digital signature / Key distribution / Public key certificate / Pretty Good Privacy / Peer-to-peer / Certificate authority / Diffie–Hellman key exchange / Routing / Cryptography / Public-key cryptography / Key management

Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:17:54
UPDATE