<--- Back to Details
First PageDocument Content
Commitment scheme / Verifiable secret sharing / Lecture Notes in Computer Science / Claw-free permutation / Small subgroup confinement attack / Strong RSA assumption / Cryptography / Oblivious transfer / Silvio Micali
Date: 2007-02-20 14:38:13
Commitment scheme
Verifiable secret sharing
Lecture Notes in Computer Science
Claw-free permutation
Small subgroup confinement attack
Strong RSA assumption
Cryptography
Oblivious transfer
Silvio Micali

Add to Reading List

Source URL: crypto.cs.mcgill.ca

Download Document from Source Website

File Size: 45,11 KB

Share Document on Facebook

Similar Documents

RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

DocID: 1atOP - View Document

RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

DocID: 12N0u - View Document

Random oracle / Digital signature / Standard model / RSA / Cramer–Shoup cryptosystem / Public key certificate / Strong RSA assumption / Advantage / BLS / Cryptography / Public-key cryptography / Group signature

Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush University of Texas at Austin [removed]

DocID: k99Z - View Document

Finite fields / Cryptographic protocols / Homomorphic encryption / Diffie–Hellman problem / Strong RSA assumption / RSA / Elliptic curve cryptography / Actor model / Eurocrypt / Cryptography / Public-key cryptography / Computational hardness assumptions

Victor Shoup Curriculum Vitae Feb. 6, 2014 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street

DocID: 8Vhh - View Document

Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions

Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang

DocID: 3dyK - View Document