Provable security

Results: 54



#Item
1

Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

Add to Reading List

Source URL: carmelatroncoso.com

Language: English - Date: 2015-11-19 22:20:42
    2

    Provable post-quantum security Renato Renner Institute for Theoretical Physics

    Add to Reading List

    Source URL: pqc2010.cased.de

    Language: English - Date: 2010-06-02 01:48:25
      3

      A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

      Add to Reading List

      Source URL: www.iacr.org

      - Date: 2008-06-01 02:58:21
        4

        How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

        Add to Reading List

        Source URL: www.sjero.net

        - Date: 2015-03-23 13:54:32
          5

          Practice-Oriented Provable Security and the Social Construction of Cryptography Phillip Rogaway∗ May 22, 2009† Abstract

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          - Date: 2015-07-03 16:39:39
            6Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

            2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

            Add to Reading List

            Source URL: www.ieee-security.org

            Language: English - Date: 2015-05-11 16:43:10
            7Cryptography / Pseudorandomness / Advantage / Semantic security / Negligible function / Provable security / Concrete security / Pseudorandom permutation / Pseudorandom generator theorem / Pseudorandom generator / Ciphertext indistinguishability / Block cipher

            On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2005-06-19 20:47:33
            8

            A list of inept businesses and organisations and why. A warning for those who are not aware of their failings. This is just my provable experiences. Yahoo. This company is now so in league with the American security agen

            Add to Reading List

            Source URL: aromamedical.org

            Language: English - Date: 2015-09-01 11:05:09
              9Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

              A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

              Add to Reading List

              Source URL: software.imdea.org

              Language: English - Date: 2014-07-17 09:25:52
              10Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve

              Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

              Add to Reading List

              Source URL: 2010.eccworkshop.org

              Language: English - Date: 2010-10-25 19:46:00
              UPDATE