One-way function

Results: 187



#Item
31Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
32Mouse / Event / GUI widget / Pointing device / Function / C / Apple Mouse / Computing / Software engineering / Subroutines

Processing the Mouse We are now on our way to really breaking through in Processing. We are now going to focus on inputs for Processing. The most simple one you have been using this whole time is the mouse. We are going

Add to Reading List

Source URL: cdn.sparkfun.com

Language: English - Date: 2014-04-18 12:00:22
33Search algorithms / Cryptography / Academia / Knowledge / Neil Gershenfeld / Year of birth missing / Hash function / Doctorate / Professor / Hashing / Education / Cryptographic hash functions

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
34GMR / Claw-free permutation / Digital signature / One-way function / Goldwasser–Micali cryptosystem / Silvio Micali / Quadratic residue / RSA / Binary tree / Cryptography / Public-key cryptography / Electronic commerce

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
35Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:30
36Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
37Public-key cryptography / Elementary number theory / Prime number / One-time pad / One-way function / Divisor / Cryptography / Mathematics / Integer sequences

One-Way Functions Tanya Khovanova October 4, 2010 Class Discussion One-way functions. Public Key Encryption. Calculation Time.

Add to Reading List

Source URL: www.tanyakhovanova.com

Language: English - Date: 2011-02-15 15:00:38
38Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
39One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
40IP / Homomorphic encryption / Zero-knowledge proof / NP / One-way function / Cryptography / Applied mathematics / Cryptographic protocols

ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 10:26:13
UPDATE