Elgamal

Results: 165



#Item
1

Published in P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), volof Lecture Notes in Computer Science, pp, Springer, 2016. Secure ElGamal-type Cryptosystems

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-03-24 12:20:23
    2Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

    ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: English - Date: 2015-05-05 08:36:37
    3Cryptography / Public-key cryptography / Computational complexity theory / Paillier cryptosystem / Proof of knowledge / Commitment scheme / RSA / Zero-knowledge proof / Permutation / ElGamal encryption / IP

    A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 08:52:53
    4Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

    Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

    Add to Reading List

    Source URL: www.cyber-ta.org

    Language: English - Date: 2007-02-22 22:55:51
    5Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

    Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2015-03-03 02:38:59
    6Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

    Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 08:51:39
    7Cryptography / Paillier cryptosystem / GoldwasserMicali cryptosystem / Ciphertext indistinguishability / RSA / OkamotoUchiyama cryptosystem / Cryptosystem / ElGamal encryption

    LNCSOffline/Online Mixing

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 08:51:04
    8Group theory / Finite fields / Public-key cryptography / Cryptography / Key management / Discrete logarithm / Index calculus algorithm / ElGamal encryption / Key / XTR / DiffieHellman key exchange / RSA

    Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

    Add to Reading List

    Source URL: www.math.ru.nl

    Language: English - Date: 2016-04-18 16:34:53
    9ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

    Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-05-02 04:08:26
    10Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

    This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-02-21 09:51:42
    UPDATE