Elgamal

Results: 165



#Item
31This article has been accepted for publication by ISPEC 2014, but has not been fully edited. Content may change prior to final publication. Citation information: DOI: , ISPEC 2014: Th

This article has been accepted for publication by ISPEC 2014, but has not been fully edited. Content may change prior to final publication. Citation information: DOI: , ISPEC 2014: Th

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-20 04:52:56
32Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1  Royal Holloway, University of London

Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 16:38:11
33A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:06:04
34This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
35Microsoft PowerPoint - IRMA eID 0.3.pptx

Microsoft PowerPoint - IRMA eID 0.3.pptx

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-08 08:50:17
36Werking van het eID Stelsel

Werking van het eID Stelsel

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-23 06:24:06
37An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
38Ciphertext-Policy Attribute-Based Encryption

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
39Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese  Information Security Institute

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
40Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37