Provable security

Results: 54



#Item
41Cryptographic hash functions / Electronic Signatures in Global and National Commerce Act / Electronic signature / Digital signature / RSA / Provable security / IEEE P1363 / SHA-1 / Cryptography / Public-key cryptography / CRYPTREC

Report on Present State of ESIGN Signature Evaluation (full evaluation) January 28, 2002 Yasuyuki Sakai, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
42Cryptographic hash function / Digital signature / Key / Provable security / CRYPTREC / Cryptography / Public-key cryptography / Key management

Report on Present State of DSA Signature Evaluation (full evaluation) January 28, 2002 Seiichi Susaki, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
43Elliptic curve cryptography / Digital signature / Provable security / Generic group model / Public-key cryptography / Random oracle / Elliptic curve / Cryptography / CRYPTREC / Elliptic Curve DSA

Report on Present State of ECDSA Evaluation (full evaluation) January 28, 2002 Atsushi Shimbo, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
44Mathematical series

Provable Security of BLAKE with Non-Ideal Compression Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:55:14
    45Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

    SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-21 15:14:18
    46Data Encryption Standard / Block cipher modes of operation / One-key MAC / Block cipher / DEAL / Provable security / CMAC / Cryptography / Message authentication codes / Advanced Encryption Standard

    UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY · DAVIS · IRVINE · LOS ANGELES · RIVERSIDE · SAN DIEGO · SAN FRANCISCO

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-08-01 16:28:12
    47Algebra / QUAD / Keystream / Quadratic form / RC4 / Pseudorandom number generator / Hidden Field Equations / XTR / Quadratic / Cryptography / Stream ciphers / Mathematics

    QUAD: a Practical Stream Cipher with Provable Security Cˆ

    Add to Reading List

    Source URL: crypto.rd.francetelecom.com

    Language: English - Date: 2009-09-02 11:51:02
    48Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

    UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    49Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions

    ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-07-13 05:54:26
    50Silvio Micali

    1. Introduction to the Theory of Provable Security of Public Key Cryptosystems

    Add to Reading List

    Source URL: www.ieice.org

    Language: English - Date: 2007-06-28 21:44:04
      UPDATE