Elgamal

Results: 165



#Item
101Secure communication / Cryptographic protocols / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Yale University Department of Computer Science Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs David Isaac Wolinsky

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-28 11:34:07
102Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
103IP / Mathematics / NP / Valuation / Zero-knowledge proof / Cryptographic protocols / Applied mathematics / Proof of knowledge

Verifiable Mixing (Shuffling) of ElGamal Pairs C. Andrew Neff∗ April 21, 2004† Abstract We give an improved presentation of the protocol first published

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2004-04-21 21:18:47
104Applied mathematics / Security / ID-based encryption / RSA / ElGamal encryption / Cipher / Advantage / Cryptography / Public-key cryptography / Cyberwarfare

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
105Operator theory / XTR / Commitment scheme / Entropy / ElGamal encryption / Representation theory of finite groups / Cryptography / Finite fields / Information theory

On Continual Leakage of Discrete Log Representations Shweta Agrawal∗ Yevgeniy Dodis† Vinod Vaikuntanathan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-28 14:17:56
106Electronic commerce / Homomorphic encryption / ElGamal encryption / Learning with errors / Threshold cryptosystem / RSA / Semantic security / Secure multi-party computation / Cipher / Cryptography / Public-key cryptography / Cryptographic protocols

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov∗ Abhishek Jain†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-11 13:30:56
107Semantic security / RSA / Feistel cipher / ElGamal encryption / Proxy re-encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Homomorphic encryption

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
108Cramer–Shoup cryptosystem / Malleability / Optimal asymmetric encryption padding / ElGamal encryption / Chosen-plaintext attack / RSA / Cipher / Adaptive chosen-ciphertext attack / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
109Engineering / Technology / Education / Structural health monitoring / Structural engineering / Bridge / California Institute for Telecommunications and Information Technology

3.5 ON-LINE STRUCTURAL MONITORING AND DATA MANAGEMENT A. ELGAMAL

Add to Reading List

Source URL: www.cosmos-eq.org

Language: English - Date: 2011-06-14 18:57:29
110Homomorphic encryption / Electronic commerce / Ciphertext indistinguishability / Secure multi-party computation / Secret sharing / Cipher / RSA / ElGamal encryption / Semantic security / Cryptography / Public-key cryptography / Cryptographic protocols

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana L´opez-Alt New York University Eran Tromer∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-07 16:19:48
UPDATE