Elgamal

Results: 165



#Item
61Cryptographic protocols / Electronic commerce / Diffie–Hellman key exchange / XTR / ElGamal encryption / RSA / Discrete logarithm / Diffie–Hellman problem / Commitment scheme / Cryptography / Finite fields / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2005 Assignment #3 Due: Monday, Feb. 28th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-22 17:09:50
62Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / ElGamal encryption / XTR / RSA / Diffie–Hellman problem / Computational Diffie–Hellman assumption / Discrete logarithm / Cryptography / Public-key cryptography / Cryptographic protocols

CS255: Cryptography and Computer Security Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-18 23:13:10
63Finite fields / Cryptographic protocols / Electronic commerce / Diffie–Hellman key exchange / XTR / ElGamal encryption / RSA / Computational Diffie–Hellman assumption / Discrete logarithm / Cryptography / Public-key cryptography / Computational hardness assumptions

CS255: Cryptography and Computer Security Winter 2004 Assignment #3 Due: Monday, March 1st, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-02-22 02:05:11
64Computational hardness assumptions / Electronic commerce / Cryptographic protocols / RSA / Diffie–Hellman key exchange / ElGamal encryption / XTR / Diffie–Hellman problem / Computational Diffie–Hellman assumption / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2002 Assignment #3 Due: Friday, March 8th, 2002 at 5pm.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-03-05 19:45:19
65Hashing / Error detection and correction / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / RSA / One-way compression function / Cryptography / Cryptographic hash functions / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-14 15:44:45
66RSA / ElGamal encryption / Diffie–Hellman key exchange / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Assignment #2 Winter 2000

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-31 14:21:01
67Privacy / Differential privacy / Ciphertext / RSA / Cipher / Completeness / Advantage / ICE / Internet privacy / Cryptography / Homomorphic encryption / ElGamal encryption

Data Collection With Self-Enforcing Privacy Philippe Golle Frank McSherry Ilya Mironov

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-11-30 12:42:35
68Digital signature / Rabin signature algorithm / RSA / Diffie–Hellman key exchange / ElGamal encryption / Schnorr signature / Euclidean algorithm / Naccache–Stern cryptosystem / ElGamal signature scheme / Cryptography / Public-key cryptography / XTR

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
69Applied mathematics / Ciphertext indistinguishability / Cipher / Semantic security / RSA / Mix network / Public-key cryptography / Encryption / ElGamal encryption / Cryptography / Cyberwarfare / Security

Security Analysis of Re-Encryption RPC Mix Nets Ralf K¨usters and Tomasz Truderung University of Trier, Germany {kuesters,truderung}@uni-trier.de Abstract. Re-Encryption randomized partial checking (RPC) mix nets were

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 05:22:29
70Group signature / Oblivious transfer / Public-key cryptography / Communications protocol / Signature / Cryptographic protocol / ElGamal signature scheme / Cryptography / Blind signature / Digital signature

Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.ubilab.org

Language: English - Date: 2013-09-04 09:24:20
UPDATE