Index of cryptography articles

Results: 178



#Item
41Cipher / Block cipher / Public-key cryptography / Key / RSA / Substitution cipher / One-time pad / Stream cipher / Index of cryptography articles / Cryptography / Symmetric-key algorithm / Ciphertext

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
42Message authentication codes / Internet / NTT Data / Authenticated encryption / Transport Layer Security / NTT Communications Corp / NTT DoCoMo / Outline of cryptography / Index of cryptography articles / Nippon Telegraph and Telephone / Economy of Japan / Cryptography

Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2015-02-03 21:03:02
43Public-key cryptography / Internet privacy / Alice and Bob / Simple Mail Transfer Protocol / Oblivious transfer / Pretty Good Privacy / Needham–Schroeder protocol / Index of cryptography articles / Cryptography / Email / Cryptographic protocols

A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
44Finite fields / Computational complexity theory / Diffie–Hellman problem / ElGamal encryption / Universal hashing / Paillier cryptosystem / Diffie–Hellman key exchange / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Cryptographic protocols / Public-key cryptography

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
45Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 09:17:42
46Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
47SHACAL / SHA-1 / Ciphertext / NIST hash function competition / Index of cryptography articles / One-way compression function / Cryptography / Cryptographic hash functions / Block ciphers

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
48Homomorphic encryption / RSA / ElGamal encryption / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-04 01:29:08
49SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
50Advanced Encryption Standard / SHA-1 / MD4 / Collision attack / Stream cipher / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Block cipher

Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-11 13:21:29
UPDATE