Elgamal

Results: 165



#Item
71

ISCTURKEY 2007 SÖZLÜ BİLDİRİLERİ Generalized ID-Based ElGamal Signatures with Message Recovery Said Kalkan, Kamer Kaya, and Ali Aydın Selçuk TIKLAYINIZ

Add to Reading List

Source URL: www.bilgiguvenligi.org.tr

Language: Turkish - Date: 2013-02-06 12:39:15
    72Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

    3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

    Add to Reading List

    Source URL: www.nict.go.jp

    Language: English - Date: 2013-11-21 18:59:46
    73Decisional Diffie–Hellman assumption / Paillier cryptosystem / XTR / RSA / ElGamal encryption / Cryptography / Public-key cryptography / Oblivious transfer

    4-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

    Add to Reading List

    Source URL: www.nict.go.jp

    Language: English - Date: 2013-11-21 21:07:55
    74ElGamal encryption / RSA / Oblivious transfer / XTR / Ciphertext / Cryptography / Public-key cryptography / Cryptographic protocols

    3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

    Add to Reading List

    Source URL: www.nict.go.jp

    Language: English - Date: 2012-03-11 23:15:00
    75Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

    Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

    Add to Reading List

    Source URL: www.adambarth.com

    Language: English - Date: 2007-04-29 16:34:52
    76RSA / Finite fields / Elliptic Curve DSA / Diffie–Hellman key exchange / Digital signature / Digital Signature Algorithm / SHA-1 / Subliminal channels / ElGamal signature scheme / Cryptography / Public-key cryptography / Electronic commerce

    Lattice-based Fault Attacks on DSA - Another Possible Strategy

    Add to Reading List

    Source URL: crypto.hyperlink.cz

    Language: English - Date: 2005-08-29 10:42:00
    77Subliminal channels / Diffie–Hellman key exchange / Elliptic Curve DSA / Digital signature / Digital Signature Algorithm / One-time pad / ElGamal signature scheme / Random number generator attack / Cryptography / Public-key cryptography / RSA

    Cryptographic Insecurity of the Test&Repeat Paradigm

    Add to Reading List

    Source URL: crypto.hyperlink.cz

    Language: English - Date: 2005-08-29 10:42:00
    78ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

    Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

    Add to Reading List

    Source URL: eprints.qut.edu.au

    Language: English - Date: 2010-06-09 09:12:09
    79Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

    CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2005-03-01 20:32:14
    80Paillier cryptosystem / Public-key cryptography / ElGamal encryption / Q

    Information Security and Computer Fraud, 2013, Vol. 1, No. 1, 1-7 Available online at http://pubs.sciepub.com/iscf/1/1/1 © Science and Education Publishing DOI:[removed]iscf[removed]Simplified Verifiable Re-encryption Mi

    Add to Reading List

    Source URL: www.sciepub.com

    Language: English
    UPDATE