ID-based cryptography

Results: 183



#Item
171Public-key cryptography / Secure messaging / S/MIME / Email encryption / Public key infrastructure / Encryption / Secure communication / ID-based encryption / Deniable encryption / Cryptography / Internet privacy / Email

A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2003-02-20 13:23:10
172Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
173ID-based encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Advanced Encryption Standard / Cryptography / Homomorphic encryption / Verifiable computing

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
174ID-based encryption / Cipher / Probabilistic encryption / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-04 02:57:54
175Applied mathematics / Security / ID-based encryption / Advantage / RSA / Cipher / Cryptography / Public-key cryptography / Cyberwarfare

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-03 14:20:24
176ID-based encryption / ID-based cryptography / Certificate-based encryption / Digital signature / Key / Diffie–Hellman key exchange / Public key infrastructure / Certificateless cryptography / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
177Public-key cryptography / NTRUSign / Lamport signature / NTRU / Digital signature / Lattice-based cryptography / Merkle signature scheme / ID-based encryption / Key / Cryptography / Post-quantum cryptography / Key management

PDF Document

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2009-04-08 18:56:03
178ID-based encryption / RSA / Group signature / Asiacrypt / Eurocrypt / Index of cryptography articles / Diffie–Hellman problem / Cryptography / Public-key cryptography / International Cryptology Conference

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2013-09-18 16:03:32
179Finite fields / Elliptic curves / Cryptographic protocols / Elliptic curve cryptography / Supersingular elliptic curve / Elliptic curve / SPEKE / ID-based encryption / Weil pairing / Abstract algebra / Cryptography / Algebra

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 06:55:07
180ID-based encryption / Cipher / Semantic security / Broadcast encryption / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

PDF Document

Add to Reading List

Source URL: perso.univ-rennes1.fr

Language: English - Date: 2013-02-21 17:00:27
UPDATE