Provable security

Results: 54



#Item
11Another Look at “Provable Security” Neal Koblitz Dept. of Mathematics, BoxUniv. of Washington, Seattle, WAU.S.A.

Another Look at “Provable Security” Neal Koblitz Dept. of Mathematics, BoxUniv. of Washington, Seattle, WAU.S.A.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-04 15:59:05
    12- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

    - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-11-09 21:16:55
    13Provable post-quantum security Renato Renner	 
 Institute for Theoretical Physics

    Provable post-quantum security Renato Renner Institute for Theoretical Physics

    Add to Reading List

    Source URL: pqc2010.cased.de

    Language: English - Date: 2010-06-02 01:48:25
      14Provable Security of Cryptographic Hash Functions  Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-24 06:11:58
        15- Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

        - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

        Add to Reading List

        Source URL: security-lab.jaist.ac.jp

        Language: English - Date: 2015-08-13 01:39:17
        16A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu  Abstract. We provide the first provable-secu

        A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-02-17 19:30:26
          17Antonio Marcedone Date of birth: Address: Gates Hall, RoomHoy Rd, Ithaca, NYCitizenship: Italian

          Antonio Marcedone Date of birth: Address: Gates Hall, RoomHoy Rd, Ithaca, NYCitizenship: Italian

          Add to Reading List

          Source URL: www.marcedone.it

          Language: English - Date: 2015-02-22 00:00:40
          18The Science of Security  Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

          The Science of Security Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

          Add to Reading List

          Source URL: www.ibiblio.org

          Language: English - Date: 2011-11-15 16:55:16
            19Probable security in asymmetric cryptography Speaker: Damien VERGNAUD Provable (or reductionnist) security is a set of mathematical techniques by means of which cryptographers analyze a cryptographic system and demonstra

            Probable security in asymmetric cryptography Speaker: Damien VERGNAUD Provable (or reductionnist) security is a set of mathematical techniques by means of which cryptographers analyze a cryptographic system and demonstra

            Add to Reading List

            Source URL: www.jsps.go.jp

            - Date: 2008-03-13 01:49:24
              20Beyond Provable Security:   Verifiable IND-CCA Security of OAEP

              Beyond Provable Security: Verifiable IND-CCA Security of OAEP

              Add to Reading List

              Source URL: certicrypt.gforge.inria.fr

              Language: English - Date: 2013-06-17 13:32:36