Permutation

Results: 881



#Item
341Cryptographic protocols / Trapdoor function / Claw-free permutation / One-way function / Zero-knowledge proof / XTR / Mercurial / Permutation / Communications protocol / Cryptography / Public-key cryptography / Commitment scheme

Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-30 14:18:39
342Civil law / Digital signature / Key management / Notary / RSA / Model theory / Structure / Permutation / Mathematics / Public-key cryptography / Cryptography

An extended abstract of this work appeared in the proceedings of PKCThis is the full version. Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-22 09:39:13
343Cryptographic protocols / Public-key cryptography / Proof of knowledge / Zero-knowledge proof / Digital signature / Parity of a permutation / PP / NP / XTR / Cryptography / Theoretical computer science / Applied mathematics

Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-29 06:02:29
344Permutation / Mihir Bellare / Inverse function / Inverse / Function / Lucifer / Format-preserving encryption / Advantage / Cryptography / Mathematics / Block cipher

BLOCK CIPHERS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-02 14:28:56
345Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
346SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 11:46:12
347Parity of a permutation / Digital signature / Group signature / Model theory / Structure / Blind signature / MIX / Cryptography / Mathematics / Ring signature

Tracing-by-Linking Group Signatures Victor K. Wei Dept. of Information Engineering, Chinese University of Hong Kong, Hong Kong September 18, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-09-17 23:49:43
348Abstract algebra / Group theory / Combinatorics / Field theory / Matrix / Determinant / Vector space / Permutation / Field / Algebra / Mathematics / Linear algebra

Addendum to “On the Generalized Linear Equivalence of Functions over Finite Fields” Marco Macchetti Politecnico di Milano, Milan, Italy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-10 04:14:49
349One-way function / Pseudorandom generator theorem / Hard-core predicate / Random oracle / Verifiable random function / Trapdoor function / Pseudorandom function family / Pseudorandom generator / Pseudorandom permutation / Cryptography / Pseudorandomness / Cryptographic hash functions

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
350Optimal asymmetric encryption padding / Claw-free permutation / Combinatorics / One-way function / Advantage / Random oracle / Parity of a permutation / Trapdoor function / Full Domain Hash / Cryptography / Permutations / Cryptographic hash functions

On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 12:09:46
UPDATE