Group-based cryptography

Results: 52



#Item
21Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
22Certificate authorities / Electronic commerce / Comodo Group / Computer network security / Public key certificate / Extranet / X.509 / Intranet / Root certificate / Cryptography / Public-key cryptography / Key management

Next Generation X.509 Services Comodo EPKI Manager Instant security for your web operations, internal networks and employee’s email • Easy to use web based console • Issue high quality, fully trusted

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:06:55
23Group theory / Cryptography / Decisional Diffie–Hellman assumption / Pairing / G1 / Subgroup / XDH assumption / Algebra / Computational hardness assumptions / Mathematics

Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman Stanford University, USA Eurocrypt 2010

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-07-03 02:36:48
24Finite fields / Cryptography / Group theory / Algebraic number theory / Weil pairing / XTR / Frobenius endomorphism / Supersingular elliptic curve / Pairing / Abstract algebra / Algebra / Elliptic curves

Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto1 , Hae Y. Kim1 , Ben Lynn2 , and Michael Scott3 1

Add to Reading List

Source URL: doras.dcu.ie

Language: English - Date: 2009-12-03 09:35:00
25Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
26Analytic number theory / Elliptic curve / Group theory / Hyperelliptic curve cryptography / Elliptic curve cryptography / Cryptography / Abstract algebra / Elliptic curves

. Variants of the Montgomery form based on Theta functions Pierrick Gaudry [removed]

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-11-15 13:29:11
27Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
28Hardware-based full disk encryption / Cryptography standards / Hard disk drive / Serial ATA / Serial attached SCSI / FIPS 140 / SCSI / Block cipher modes of operation / Trusted Computing Group / Computer hardware / Computing / Disk encryption

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
29Cyberwarfare / Applied mathematics / Finite fields / Homomorphic encryption / RSA / XTR / Learning with errors / Digital signature / Group signature / Cryptography / Public-key cryptography / Mathematics

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 09:24:22
30Computing / Cryptography / Disk encryption / Hardware-based full disk encryption / Trusted Computing Group / FIPS 140-2 / FIPS 140 / Parallel ATA / Trusted Computing / Computer hardware / Cryptography standards / Computer security

Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 10:58:40
UPDATE