Elgamal

Results: 165



#Item
41An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
42Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University  of Luxembourg, Faculty of Sciences, Technology and Communication

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
43Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
44Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang†  Dongdai Lin∗

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
45LNCSWhy Textbook ElGamal and RSA Encryption Are Insecure

LNCSWhy Textbook ElGamal and RSA Encryption Are Insecure

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2009-11-10 09:37:20
46Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E

Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu Department of Information Science and Electronics Engineering, ZheJiang University, YuQuan Campus, HangZhou, 310027, PR. China E

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-01 04:50:33
47A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005  Abstract

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
48Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
49Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 09:17:42
50Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-05-20 02:15:48