<--- Back to Details
First PageDocument Content
Public-key cryptography / Hidden Field Equations / Multivariate cryptography / QUAD / XTR / Trapdoor function / RSA / Index of cryptography articles / Benaloh cryptosystem / Cryptography / Post-quantum cryptography / Finite fields
Date: 2001-04-04 07:06:39
Public-key cryptography
Hidden Field Equations
Multivariate cryptography
QUAD
XTR
Trapdoor function
RSA
Index of cryptography articles
Benaloh cryptosystem
Cryptography
Post-quantum cryptography
Finite fields

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 250,49 KB

Share Document on Facebook

Similar Documents

Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

DocID: 1qO3E - View Document

Cryptography / Circuit complexity / Trapdoor function / Data Encryption Standard / Circuit / Function / Secure multi-party computation

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

DocID: 1pyIx - View Document

E-commerce / RSA / Trapdoor function / Euclidean algorithm / Water / Sheaf / XTR

Extending Nymble-like Systems Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

DocID: 1oWen - View Document

Cryptography / Abstract algebra / Algebra / Elliptic curves / Group theory / Supersingular elliptic curve / Trapdoor function / Finite fields / Elliptic curve / Lenstra elliptic curve factorization / Elliptic curve primality

A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

DocID: 1lP2X - View Document

Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

DocID: 1kMVe - View Document