Provable security

Results: 54



#Item
31Another Look at Provable Security Alfred Menezes (joint work with Sanjit Chatterjee, Neal Koblitz, Palash Sarkar) EUROCRYPT 2012 –1

Another Look at Provable Security Alfred Menezes (joint work with Sanjit Chatterjee, Neal Koblitz, Palash Sarkar) EUROCRYPT 2012 –1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 14:09:49
32Almost uniform density of power residues and the provable security of ESIGN Tatsuaki Okamoto1 and Jacques Stern2 1  2

Almost uniform density of power residues and the provable security of ESIGN Tatsuaki Okamoto1 and Jacques Stern2 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
33Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare  University of California San Diego, [removed]

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
34Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
35acm Association for Computing Machinery Advancing Computing as a Science & Profession Contact:  Virginia Gold

acm Association for Computing Machinery Advancing Computing as a Science & Profession Contact: Virginia Gold

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2013-05-21 15:34:04
36First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
37First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
38Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
39Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
40Searchable Symmetric Encryption Seny Kamara Advanced Topics in Network Security Spring 2006

Searchable Symmetric Encryption Seny Kamara Advanced Topics in Network Security Spring 2006

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:21:13