Public-key cryptography

Results: 11378



#Item
841Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-03-17 15:01:03
842Public-key cryptography / Public key infrastructure / XTR / BurrowsAbadiNeedham logic / Four-square cipher / OkamotoUchiyama cryptosystem

PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:39:38
843

Public-Key Cryptography Before 1985 Two public-key families emerged that were commercially viable: The Elliptic Curve Discrete Logarithm Problem: State of the Art

Add to Reading List

Source URL: www.iwsec.org

Language: English - Date: 2008-12-18 21:11:06
    844Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

    Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2013-09-04 15:59:08
    845Internet protocols / Internet security / Internet Standards / Secure communication / World Wide Web / Transport Layer Security / Internet censorship circumvention / SPDY / Telex / Public-key cryptography / Censorship / Tor

    Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2014-03-31 17:22:53
    846Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Cryptographic protocols / Certificate policy / Revocation list / Public key certificate / Certification Practice Statement / Certificate authority / X.509 / S/MIME

    ,1)1&$ &HUWLILFDWH3ROLF\DQG &HUWLILFDWLRQ3UDFWLFH 6WDWHPHQW Version 0.3 (DRAFT)

    Add to Reading List

    Source URL: security.fi.infn.it

    Language: English - Date: 2011-04-08 05:46:20
    847Cryptography / Public-key cryptography / Attribute-based encryption / RSA / Ciphertext indistinguishability / Encryption / Key / Authenticated encryption / PERMIS / Ciphertext

    Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    848Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:36:15
    849Key management / Public-key cryptography / Public key infrastructure / Certificate policy / Certification Practice Statement / Public key certificate / Revocation list / X.509 / Certificate authority / S/MIME / Professional certification / Key

    Microsoft Word - CPS-2_0.doc

    Add to Reading List

    Source URL: security.fi.infn.it

    Language: English - Date: 2011-04-08 05:46:20
    850Cryptography / Electric power / Secure multi-party computation / Public-key cryptography / Electricity meter / Smart meter / Smart grid / Cryptographic protocol / Privacy / Communications protocol / Zero-knowledge proof

    Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-11-04 03:36:30
    UPDATE