Elgamal

Results: 165



#Item
121NTRUSign / GGH signature scheme / Goldwasser–Micali cryptosystem / NTRU / ElGamal encryption / Quantum computer / Lattice / Lattice-based cryptography / Learning with errors / Cryptography / Post-quantum cryptography / Lattice problem

A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:00
122Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
123ElGamal signature scheme / Digital signature / Key distribution / Public key certificate / Pretty Good Privacy / Peer-to-peer / Certificate authority / Diffie–Hellman key exchange / Routing / Cryptography / Public-key cryptography / Key management

Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:17:54
124Cryptographic protocols / Threshold cryptosystem / Electronic commerce / Group signature / Secret sharing / ElGamal signature scheme / Verifiable secret sharing / Digital signature / ElGamal encryption / Cryptography / Public-key cryptography / Key management

562 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18,

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:18:45
125Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Semantic security / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik, School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {ccastell,stasio,gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 19:57:06
126Cyberwarfare / ID-based encryption / Ciphertext / ElGamal encryption / Hybrid cryptosystem / RSA / Cipher / Access control / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner† and Peter Steenkiste†‡ † Computer Science Department ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-06-27 14:38:48
127ElGamal encryption / RSA / Homomorphic encryption / Ordinal number / Applied mathematics / Public-key cryptography / Mathematics / Paillier cryptosystem

Solving the Discrete Logarithm Problem for Packing Candidate Preferences James Heather1 , Chris Culnane1 , Steve Schneider1 , Sriramkrishnan Srinivasan and Zhe Xia2 * 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
128Advantage / Chosen-ciphertext attack / Semantic security / Ciphertext / Chosen-plaintext attack / Cipher / ElGamal encryption / Cryptography / Public-key cryptography / Proxy re-encryption

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-12-07 02:49:54
129Information society / Homomorphic encryption / Probabilistic encryption / Proxy re-encryption / ElGamal encryption / Ciphertext / Blind signature / RSA / Prêt à Voter / Cryptography / Public-key cryptography / Electronic voting

Chapter 69 Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
UPDATE