Optimal asymmetric encryption padding

Results: 80



#Item
11THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-05-02 08:19:13
12CS276 Cryptography  Spring 2006 Lecture 19: Lecturer: David Wagner

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
13On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1  2

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
14Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆  Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
15Programming Language Techniques for Cryptographic Proofs

Programming Language Techniques for Cryptographic Proofs

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
16Beyond Provable Security:   Verifiable IND-CCA Security of OAEP

Beyond Provable Security: Verifiable IND-CCA Security of OAEP

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
17Programming Language Techniques for Cryptographic Proofs

Programming Language Techniques for Cryptographic Proofs

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
18Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
19DRM obfuscation vs auxiliary attacks Show me your trace and I’ll tell you who you are REcon 2014  Introduction First layer: Code flattening pTra

DRM obfuscation vs auxiliary attacks Show me your trace and I’ll tell you who you are REcon 2014 Introduction First layer: Code flattening pTra

Add to Reading List

Source URL: www.quarkslab.com

Language: English - Date: 2015-01-22 10:08:16
201234145467836391829836846489A2BCBD183  École doctorale nO 84 : Sciences et technologies de l’information et de la communication  Doctorat ParisTech

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24