One-way function

Results: 187



#Item
111Hard-core predicate / Randomness extractor / RSA / Rabin cryptosystem / Lattice problem / Trapdoor function / Key size / XTR / Advanced Encryption Standard / Cryptography / One-way function / Learning with errors

Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:05:49
112One-way function / Public-key cryptography / Verifiable computing / Cryptography / Homomorphic encryption / Cipher

Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-12 22:36:25
113Ciphertext indistinguishability / Secure multi-party computation / Advantage / Security parameter / Commitment / One-way function / Secret sharing / Public-key cryptography / Zero-knowledge proof / Cryptography / Cryptographic protocols / Commitment scheme

Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima NTT Secure Platform Laboratories, Japan. [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 19:58:40
114XTR / One-way function / Cramer–Shoup cryptosystem / RSA / Paillier cryptosystem / Advantage / Ideal lattice cryptography / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Finite fields

Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:08:40
115Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
116Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2004-11-10 12:15:25
117Cryptographic hash functions / Password-authenticated key agreement / One-way function / Password / Trapdoor function / RSA / Zero-knowledge proof / Random oracle / Isomorphism / Cryptography / Cryptographic protocols / Public-key cryptography

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
118Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
119Functions and mappings / Fourier analysis / Keccak / NIST hash function competition / Function / ICE / Block cipher / Advanced Encryption Standard / Convolution / Mathematics / Mathematical analysis / Cryptography

CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:27
120Cryptographic hash function / Proxy re-encryption / Lattice problem / Digital signature / NTRU / One-way function / Learning with errors / RSA / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Public-key cryptography

Cryptography with Lattices 07D37042 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2011-01-31 08:38:01
UPDATE