Integrated Encryption Scheme

Results: 46



#Item
1Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
2Dynamical system / Logistic map / Cipher / Public-key cryptography / Integrated Encryption Scheme / Key / Butterfly effect / Index of cryptography articles / Probabilistic encryption / Cryptography / Chaos theory / Lorenz attractor

Microsoft Word - nljul2005_2_.doc

Add to Reading List

Source URL: www.barc.gov.in

Language: English - Date: 2012-08-10 06:17:36
3Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2005-09-02 12:11:39
4Diffie–Hellman key exchange / Key management / Elliptic curve Diffie–Hellman / Quantum key distribution / RSA / Key exchange / Key / SPEKE / Integrated Encryption Scheme / Cryptography / Cryptographic protocols / Public-key cryptography

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:45
5XTR / RSA / Universal hashing / Integrated Encryption Scheme / Classical cipher / Cryptography / Commitment scheme / Public-key cryptography

CSCI-GAMATH-GAIntroduction to Cryptography April 25, 2012

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2012-04-18 13:05:18
6Chosen-ciphertext attack / ElGamal encryption / Advantage / Chosen-plaintext attack / Hybrid cryptosystem / Integrated Encryption Scheme / Ciphertext / Cipher / RSA / Cryptography / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
7Security / Cipher / Advantage / ID-based encryption / XTR / Applied mathematics / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Ciphertext indistinguishability

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 20:36:43
8MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
9ID-based encryption / Key size / Key / Symmetric-key algorithm / Encryption / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cipher / Public-key cryptography

Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 09:55:41
10Cipher / RSA / Probabilistic encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Advantage

Predicate Privacy in Encryption Systems Emily Shen MIT Elaine Shi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-24 17:15:01
UPDATE