Provable

Results: 110



#Item
51

Provable Data Plane Connectivity with Local Fast Failover Introducing OpenFlow Graph Algorithms Michael Borokhovich (Ben Gurion Uni, Israel) Liron Schiff (Tel Aviv Uni, Israel)

Add to Reading List

Source URL: www.net.t-labs.tu-berlin.de

Language: English - Date: 2014-08-22 12:51:17
    52

    Ramsey’s theorem for pairs and provable recursive functions Alexander Kreuzer (joint work with Ulrich Kohlenbach) TU Darmstadt Logic Colloquium 2009

    Add to Reading List

    Source URL: www.math.nus.edu.sg

    Language: English
      53Scuola superiore di Catania / Computer science / Whitfield Diffie / Provable security / Aarhus University / Nigel Smart / Cryptography / Ivan Damgård / University of Catania

      Antonio Marcedone Date of birth: Address: Gates Hall, RoomHoy Rd, Ithaca, NYCitizenship: Italian

      Add to Reading List

      Source URL: www.marcedone.it

      Language: English - Date: 2015-02-22 00:00:40
      54

      The Science of Security Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

      Add to Reading List

      Source URL: www.ibiblio.org

      Language: English - Date: 2011-11-15 16:55:16
        55

        Provable Secure Constant-Round Group Key Agreement Protocol based on Secret Sharing Ruxandra F. Olimid Department of Computer Science, University of Bucharest, Romania

        Add to Reading List

        Source URL: ruxandraolimid.weebly.com

        Language: English - Date: 2013-11-02 15:03:34
          56

          Probable security in asymmetric cryptography Speaker: Damien VERGNAUD Provable (or reductionnist) security is a set of mathematical techniques by means of which cryptographers analyze a cryptographic system and demonstra

          Add to Reading List

          Source URL: www.jsps.go.jp

          - Date: 2008-03-13 01:49:24
            57

            De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results Yuriy Arbitman∗ Moni Naor†

            Add to Reading List

            Source URL: www.wisdom.weizmann.ac.il

            Language: English - Date: 2009-05-03 13:29:04
              58Ciphertext indistinguishability / Public-key cryptography / Mathematical proof / Concrete security / Random oracle / RSA / Equivalence relation / Cryptography / Optimal asymmetric encryption padding / Mathematical logic

              Beyond Provable Security: Verifiable IND-CCA Security of OAEP

              Add to Reading List

              Source URL: certicrypt.gforge.inria.fr

              Language: English - Date: 2013-06-17 13:32:36
              59Mathematical proof / RSA / PP / Provable security / Cryptography / Mathematics / Mathematical logic

              CertiCrypt Language-Based Cryptographic Proofs in Coq Gilles Barthe1,2 Benjamin Grégoire1,3 Santiago Zanella 1,3 1 Microsoft

              Add to Reading List

              Source URL: certicrypt.gforge.inria.fr

              Language: English - Date: 2013-06-17 13:32:36
              60Block cipher / Cipher / RSA / Authenticated encryption / Symmetric-key algorithm / Key size / Provable security / Key / Cryptographic protocol / Cryptography / Block cipher modes of operation / Public-key cryptography

              Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

              Add to Reading List

              Source URL: www.isg.rhul.ac.uk

              Language: English - Date: 2014-10-10 11:05:41
              UPDATE