Function key

Results: 1153



#Item
291Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
292Cryptographic protocols / Trapdoor function / Claw-free permutation / One-way function / Zero-knowledge proof / XTR / Mercurial / Permutation / Communications protocol / Cryptography / Public-key cryptography / Commitment scheme

Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-30 14:18:39
293Public-key cryptography / IP / One-way function / Communications protocol / Fuse / Cryptography / Homomorphic encryption / Zero-knowledge proof

On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-23 15:21:41
294Cryptographic hash functions / Hash chain / Hash function / Password / S/KEY / Rainbow table / Hash table / Cryptography / Hashing / Search algorithms

Construction and Traversal of Hash Chain with Public Links Vipul Goyal OSP Global Mumbai, India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-26 16:46:21
295Equivalence relation / Differential cryptanalysis / Differential equation / ICE / Function / Vector space / Equivalence of categories / Algebra / Mathematics / Linear cryptanalysis

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 23:46:18
296Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
297Impossible differential cryptanalysis / Block cipher / Differential cryptanalysis / HMAC / Symmetric-key algorithm / Cryptographic hash function / COSIC / Aanval / Advanced Encryption Standard / Cryptography / Hashing / SHACAL

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02
298Search algorithms / Error detection and correction / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-25 02:38:23
299Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
300Bitcoin / Peer-to-peer computing / Proof-of-work system / Commitment scheme / Hash tree / Consensus / Cryptographic hash function / RSA / Cryptography / Public-key cryptography / Hashing

CommitCoin: Carbon Dating Commitments with Bitcoin? Jeremy Clark1 and Aleksander Essex2 1 Carleton University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-15 00:09:47
UPDATE