Group-based cryptography

Results: 52



#Item
31Notary / Digital signature / Electronic signature / Security token / Cryptographic protocol / Non-repudiation / Public key infrastructure / Public key certificate / Blind signature / Cryptography / Public-key cryptography / Key management

Trust Relations in a Digital Signature System Based on a Smart Card Jean-Luc Giraud & Ludovic Rousseau Gemplus, Cryptography & Security Group, B.P. 100, 13881 Gémenos Cedex, France Phone: +[removed]22, +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
32Elliptic curves / Cryptography / Group theory / Finite fields / Linear algebra / Elliptic curve cryptography / Pairing / Elliptic curve / Supersingular elliptic curve / Algebra / Abstract algebra / Mathematics

SUBMITTED TO JOURNAL OF 1 Software implementation of an Attribute-Based Encryption scheme

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-05-30 22:32:03
33Group-based cryptography / McEliece cryptosystem / Cryptanalysis / Index of cryptography articles / Homomorphic encryption / Cryptography / Public-key cryptography / Post-quantum cryptography

Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Add to Reading List

Source URL: www.ma.rhul.ac.uk

Language: English - Date: 2012-01-12 06:55:53
34X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-13 09:22:49
35Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
36Applied mathematics / Security / ID-based encryption / RSA / ElGamal encryption / Cipher / Advantage / Cryptography / Public-key cryptography / Cyberwarfare

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
37X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-03-15 09:46:20
38Advantage / Cipher / RSA / Random oracle / Probabilistic encryption / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30
39Linear algebra / Cryptography / Group theory / Computational hardness assumptions / Transpose / XTR / Decision Linear assumption / Inner product space / ID-based encryption / Algebra / Mathematics / Abstract algebra

Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko ∗ The University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-18 02:15:43
40Disk encryption / Hardware-based full disk encryption / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Initialization vector / Solid-state drive / Windows Vista / Trusted Computing Group / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-09 15:42:02
UPDATE