<--- Back to Details
First PageDocument Content
Signcryption / Elliptic curve cryptography / Elliptic curve / ElGamal signature scheme / IEEE P1363 / ElGamal encryption / Digital signature / Index of cryptography articles / Homomorphic signatures for network coding / Cryptography / Public-key cryptography / Finite fields
Date: 2013-03-05 21:36:41
Signcryption
Elliptic curve cryptography
Elliptic curve
ElGamal signature scheme
IEEE P1363
ElGamal encryption
Digital signature
Index of cryptography articles
Homomorphic signatures for network coding
Cryptography
Public-key cryptography
Finite fields

Add to Reading List

Source URL: www.signcryption.org

Download Document from Source Website

File Size: 89,11 KB

Share Document on Facebook

Similar Documents

Public-key cryptography / Coding theory / Finite fields / Information theory / Linear network coding / Wireless sensor network / RSA / Digital signature / Homomorphism / Homomorphic encryption

Homomorphic Signatures for Verifiable Computing Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pAot - View Document

Cryptography / Algebra / Public-key cryptography / Pairing-based cryptography / Elliptic curves / Group theory / Analytic number theory / Weil pairing / Divisor / Pairing / Homomorphic signatures for network coding

Exercises on pairings on elliptic curves Andreas Enge Leuven, Friday, 13 September 2013 Exercise 1 (Weil reciprocity). Let E : Y 2 = X 3 + X over F7 , f = Y , g = X−1 X−3 . Compute div f and div g, and verify that f

DocID: 1menO - View Document

Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

DocID: 19OIw - View Document

Coding theory / Finite fields / Information / Cryptography / Network coding / Hash function / Hash list / Very smooth hash / Homomorphic signatures for network coding / Hashing / Cryptographic hash functions / Error detection and correction

1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+

DocID: 19zI1 - View Document

Parity of a permutation / Permutations / Model theory / Cryptographic hash functions / Homomorphic signatures for network coding / Mathematics / Group theory / Parity

Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

DocID: 19n6t - View Document