Lecture Notes in Computer Science

Results: 278



#Item
271Public-key cryptography / Diffie–Hellman key exchange / ElGamal encryption / Diffie–Hellman problem / Polynomial / RSA / Prime number / XTR / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Finite fields

In Advances in Cryptology—Asiacrypt’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]Doing More with Fewer Bits

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2000-02-21 14:17:00
272Algorithm / Computer science / Symposium on Parallelism in Algorithms and Architectures / Lecture Notes in Computer Science / Science / Computing / Dagstuhl / Leibniz-Gemeinschaft / Theoretical computer science

Curriculum Vitae 1. Full Name:

Add to Reading List

Source URL: wwwmayr.in.tum.de

Language: English - Date: 2011-01-31 03:06:26
273Public-key cryptography / Publicly Verifiable Secret Sharing / Finite fields / Verifiable secret sharing / Secret sharing / ElGamal encryption / Diffie–Hellman key exchange / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Cryptography / Cryptographic protocols / Computational hardness assumptions

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09
274Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
275Mathematics / Logic in computer science / Theory of computation / Type theory / Computability theory / Simply typed lambda calculus / Combinatory logic / Typed lambda calculus / Normalization property / Theoretical computer science / Lambda calculus / Mathematical logic

Lecture Notes on the Lambda Calculus Peter Selinger Department of Mathematics and Statistics

Add to Reading List

Source URL: www.mathstat.dal.ca

Language: English - Date: 2013-09-21 21:21:50
276Operations research / Theoretical computer science / Phylogenetics / Robinson–Foulds metric / Lecture Notes in Computer Science / SWAT and WADS conferences / Support / Computational biology / Science / Applied mathematics / Software engineering / Algorithm engineering

PDF Document

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2006-12-01 02:04:04
277National security / Computer security / Lecture Notes in Computer Science / Indocrypt / Ambient intelligence / Security engineering / Information security / Cipher / National Security Agency / Security / Cryptography / Crime prevention

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-07 13:36:06
278Commitment scheme / Verifiable secret sharing / Lecture Notes in Computer Science / Claw-free permutation / Small subgroup confinement attack / Strong RSA assumption / Cryptography / Oblivious transfer / Silvio Micali

PDF Document

Add to Reading List

Source URL: crypto.cs.mcgill.ca

Language: English - Date: 2007-02-20 14:38:13
UPDATE