Integrated Encryption Scheme

Results: 46



#Item
11Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail:  14th February 2000

Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail: 14th February 2000

Add to Reading List

Source URL: www.basiccard.com

Language: English - Date: 2000-02-16 08:07:52
12CS255: Cryptography and Computer Security  Winter 2004 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:20
13International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1

International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-02-09 20:01:10
14Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
15CS255: Cryptography and Computer Security  Winter 2004 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-03-01 20:32:14
16Standards for Efficient Cryptography  SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:11
17Standards for Efficient Cryptography  SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: Daniel R. L. Brown ([removed]) January 27, 2010

Standards for Efficient Cryptography SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: Daniel R. L. Brown ([removed]) January 27, 2010

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:12
18Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
19Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
20How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00