One-way function

Results: 187



#Item
11Neurophysiology / Max Planck Florida Institute for Neuroscience / Synaptic vesicle / Synapse / Neuroscience / Calyx of Held / Max Planck Institute for Experimental Medicine / Max Planck Institute of Neurobiology

Samuel M. Young, Jr. PhD Max Planck Research Group Leader Research Group Molecular Mechanisms of Synaptic Function Max Planck Florida Institute for Neuroscience One Max Planck Way Jupiter, Florida USA 33458

Add to Reading List

Source URL: www.samuelyounglab.org

Language: English - Date: 2015-02-19 09:41:53
12Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
13

Goldreich’s One-Way Function Candidate and Myopic Backtracking Algorithms James Cook1, , Omid Etesami1, , Rachel Miller2,   , and Luca Trevisan1,† 1 Computer Science Division, U.C. Berkeley

Add to Reading List

Source URL: www.falsifian.org

Language: English - Date: 2012-11-10 18:57:51
    14

    Types of Recursion – additional note When analyzing recursive functions, one way is to break up the analysis into the work done before the recursive function application and the work done after the recursive function a

    Add to Reading List

    Source URL: www.student.cs.uwaterloo.ca

    Language: English - Date: 2016-02-23 20:05:31
      15Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

      Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

      Add to Reading List

      Source URL: pub.ist.ac.at

      Language: English - Date: 2014-06-19 16:51:50
      16Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

      Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-06-28 21:51:08
      17

      Quantum One-Way Communication can be Exponentially Stronger Than Classical Communication Oded Regev (joint work with B. Klartag) In STOC 1999, Raz presented a (partial) function for which there is a quantum protocol comm

      Add to Reading List

      Source URL: qip2011.quantumlah.org

      - Date: 2011-01-11 05:19:49
        18Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

        Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

        Add to Reading List

        Source URL: pub.ist.ac.at

        Language: English - Date: 2014-06-19 17:26:59
        19Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

        Introduction MD New Results I

        Add to Reading List

        Source URL: www.hyperelliptic.org

        Language: English - Date: 2008-09-27 14:59:29
        20Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

        How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

        Add to Reading List

        Source URL: www.anf.es

        Language: English - Date: 2014-05-12 07:16:17
        UPDATE