Hash-based cryptography

Results: 78



#Item
61Cryptographic hash function / Proxy re-encryption / Lattice problem / Digital signature / NTRU / One-way function / Learning with errors / RSA / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Public-key cryptography

Cryptography with Lattices 07D37042 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2011-01-31 08:38:01
62Lattice problem / Commitment scheme / Universal hashing / Lattice-based cryptography / Zero-knowledge proof / NP / Cryptographic hash function / IP / Hash function / Cryptography / Theoretical computer science / Applied mathematics

Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems Akinori Kawachi∗ Keisuke Tanaka∗

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04
63Lattice / Cryptographic hash function / Digital signature / Ideal lattice cryptography / Cryptography / Mathematics / Abstract algebra

A Compact Signature Scheme Based on Ideal Lattices Keita Xagawa/Keisuke Tanaka (Tokyo Tech) Results Gentry, Peikert,

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:02
64Lattice problem / Lattice-based cryptography / Commitment scheme / Zero-knowledge proof / IP / Universal hashing / NP / Cryptographic hash function / Lattice / Cryptography / Theoretical computer science / Applied mathematics

ISSN[removed]Research Reports on Mathematical and Computing Sciences

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:07
65One-way function / Cryptographic hash function / Lattice / Hash function / Ideal lattice cryptography / Random oracle / Collision resistance / Trapdoor function / Cryptography / Lattice-based cryptography / Lattice problem

A Compact Signature Scheme with Ideal Lattice (Extended Abstract) Keita Xagawa ∗ Keisuke Tanaka ∗

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04
66Cryptographic protocols / Electronic commerce / Public key certificate / X.509 / Internet privacy / Cryptographic hash function / .mobi / Certificate authority / Skype security / Cryptography / Public-key cryptography / Key management

Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang and Margaret Martonosi Dept. of Electrical Engineering Princeton Univ

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2008-04-24 05:07:51
67One-way function / Permutation / Preimage attack / Applied mathematics / Mathematics / Combinatorics / Cryptography

Hash Functions Based on Three Permutations: A Generic Security Analysis Bart Mennink and Bart Preneel Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and IBBT, Belgium [removed], bart.preneel@esa

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
68Stream ciphers / Pseudorandomness / Search algorithms / Hashing / F-FCSR / Hash function / Cryptographic hash function / Feedback with Carry Shift Registers / Pseudorandom generator theorem / Cryptography / Theoretical computer science / Applied mathematics

Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Add to Reading List

Source URL: www.aui.ma

Language: English - Date: 2012-07-13 06:37:48
69RSA / Hash function / One-way function / Trapdoor function / Cryptography / Digital signature / Cryptographic hash function

Hierarchical Identity-Based Chameleon Hash and Its Applications Feng Bao1 , Robert H. Deng2 , Xuhua Ding2 , Junzuo Lai2⋆ , and Yunlei Zhao3 1 Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2011-06-01 03:00:45
70Technology / Public-key cryptography / Near field communication / Coupon / Communications protocol / Cryptography / Cryptographic protocols / Data

Formal Security Analysis and Improvement of a hash-based NFC M-coupon Protocol Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:15
UPDATE