Provable

Results: 110



#Item
101Data Encryption Standard / Block cipher modes of operation / One-key MAC / Block cipher / DEAL / Provable security / CMAC / Cryptography / Message authentication codes / Advanced Encryption Standard

UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY · DAVIS · IRVINE · LOS ANGELES · RIVERSIDE · SAN DIEGO · SAN FRANCISCO

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:28:12
102Search algorithms / Theoretical computer science / Graph theory / Operations research / Routing algorithms / A* search algorithm / Heuristic function / Mathematical optimization / Shortest path problem / Mathematics / Applied mathematics / Heuristics

ARA*: Anytime A* with Provable Bounds on Sub-Optimality Maxim Likhachev, Geoff Gordon and Sebastian Thrun School of Computer Science Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-17 12:21:05
103Algebra / QUAD / Keystream / Quadratic form / RC4 / Pseudorandom number generator / Hidden Field Equations / XTR / Quadratic / Cryptography / Stream ciphers / Mathematics

QUAD: a Practical Stream Cipher with Provable Security Cˆ

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
104Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
105Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
106Silvio Micali

1. Introduction to the Theory of Provable Security of Public Key Cryptosystems

Add to Reading List

Source URL: www.ieice.org

Language: English - Date: 2007-06-28 21:44:04
    107Provable security / Public-key cryptography / Oracle machine / Oracle Corporation / Computer security / Standard model / Linked timestamping / Cryptography / Cryptographic hash functions / Random oracle

    PDF Document

    Add to Reading List

    Source URL: dspace.utlib.ee

    Language: English - Date: 2011-04-21 20:04:56
    108Neal Koblitz / Random oracle / RSA / Oded Goldreich / Mathematical proof / Alfred Menezes / MQV / Index of cryptography articles / Cryptography / Public-key cryptography / Provable security

    PDF Document

    Add to Reading List

    Source URL: www.ams.org

    Language: English - Date: 2008-01-24 11:26:55
    109Verifiable secret sharing / Interactive proof system / Claude Crépeau / Gödel Prize / Pseudorandom function family / Zero-knowledge proof / Provable security / Oblivious transfer / Non-interactive zero-knowledge proof / Cryptography / Cryptographic protocols / Silvio Micali

    PDF Document

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2013-05-18 10:50:53
    110Provable security / Public-key cryptography / Oracle machine / Oracle Corporation / Computer security / Standard model / Linked timestamping / Cryptography / Cryptographic hash functions / Random oracle

    PDF Document

    Add to Reading List

    Source URL: dspace.utlib.ee

    Language: English - Date: 2011-04-21 20:04:56
    UPDATE