Integrated Encryption Scheme

Results: 46



#Item
11Elliptic curve cryptography / BasicCard / Digital signature / IEEE P1363 / SHA-1 / Crypt / Integrated Encryption Scheme / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail: 14th February 2000

Add to Reading List

Source URL: www.basiccard.com

Language: English - Date: 2000-02-16 08:07:52
12Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:20
13Finite fields / Elliptic curves / Public-key cryptography / Elliptic curve / Cipher / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Abstract algebra / Elliptic curve cryptography

International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-02-09 20:01:10
14ID-based encryption / Secrecy / Homomorphic encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Security

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
15Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-03-01 20:32:14
16Key management / Elliptic curve cryptography / IEEE P1363 / MQV / Integrated Encryption Scheme / Elliptic curve / Key size / SECG / Digital signature / Cryptography / Public-key cryptography / Cryptography standards

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:11
17Cryptography / Elliptic curve cryptography / SECG / Elliptic curve / IEEE P1363 / Parameter / Integrated Encryption Scheme / Cryptography standards / Mathematics / Finite fields

Standards for Efficient Cryptography SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: Daniel R. L. Brown ([removed]) January 27, 2010

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:12
18Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
19ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
20RSA / Malleability / Key encapsulation / ElGamal encryption / Symmetric-key algorithm / Cipher / Homomorphic encryption / Semantic security / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Deniable encryption

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
UPDATE