Elgamal

Results: 165



#Item
81Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Diffie–Hellman key exchange / Semantic security / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia2,1 , Stanislaw Jarecki1, and Gene Tsudik1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
82Computational hardness assumptions / BLS / Schnorr signature / Forking lemma / Digital signature / XTR / ElGamal encryption / Random oracle / Diffie–Hellman problem / Cryptography / Public-key cryptography / Finite fields

A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
83PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: gnupg.org

Language: English - Date: 2000-08-08 10:33:16
84ElGamal encryption / Malleability / RSA / Index of cryptography articles / Mental poker / Cryptography / Public-key cryptography / Proxy re-encryption

Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:04:55
85Field theory / Finite fields / Public-key cryptography / Group theory / Elliptic Curve DSA / Elliptic curve cryptography / Elliptic curve / ElGamal signature scheme / Discrete logarithm / Abstract algebra / Cryptography / Algebra

The Elliptic Curve Digital Signature Algorithm (ECDSA)    

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2009-10-15 20:03:40
86Security / Malleability / ElGamal encryption / RSA / Applied mathematics / Blinding / Public-key cryptography / Cryptography / Cyberwarfare

Distributed Blinding for ElGamal Re-encryption∗ Lidong Zhou†, Michael A. Marsh‡, Fred B. Schneider§, and Anna Redz¶ January 2, 2004 Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-16 13:38:04
87IP / Mathematics / NP / Valuation / Zero-knowledge proof / Cryptographic protocols / Applied mathematics / Proof of knowledge

Verifiable Mixing (Shuffling) of ElGamal Pairs C. Andrew Neff∗ April 21, 2004† Abstract We give an improved presentation of the protocol first published

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-04-21 22:18:47
88Mathematics / Homomorphic encryption / Paillier cryptosystem / Electronic commerce / Applied mathematics / Homomorphism / ElGamal encryption / Group homomorphism / RSA / Public-key cryptography / Morphisms / Cryptography

An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623

Add to Reading List

Source URL: www.cs.rit.edu

Language: English - Date: 2011-05-15 17:17:55
89Cramer–Shoup cryptosystem / Plaintext-aware encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Ciphertext / ElGamal encryption / RSA / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
90Applied mathematics / RSA / Security / Digital signature / Rabin signature algorithm / ElGamal signature scheme / Public-key cryptography / Cryptography / Cyberwarfare

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
UPDATE