Public-key cryptography

Results: 11378



#Item
1-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1  University of Cincinnati and Technische Universität Darmstadt

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:42
2Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1  3

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-04-04 23:26:12
3Multivariate Public Key Cryptography Jintai Ding 1  2

Multivariate Public Key Cryptography Jintai Ding 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-10 22:42:02
4This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-12-13 06:49:27
5Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

Add to Reading List

Source URL: crocs.fi.muni.cz

Language: English - Date: 2018-04-25 10:30:18
    6Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven  09 June 2016

    Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2016-08-28 19:31:14
      7by @bascule  ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes.

      by @bascule ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes.

      Add to Reading List

      Source URL: fails.org

      Language: English - Date: 2015-10-01 12:32:52
        8Chapter 8: Basic Cryptography • Classical Cryptography • Public Key Cryptography • Cryptographic Checksums  November 1, 2004

        Chapter 8: Basic Cryptography • Classical Cryptography • Public Key Cryptography • Cryptographic Checksums November 1, 2004

        Add to Reading List

        Source URL: nob.cs.ucdavis.edu

        Language: English - Date: 2004-11-01 01:20:26
          9Chapter 17  Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig

          Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig

          Add to Reading List

          Source URL: www.math.auckland.ac.nz

          - Date: 2014-01-05 18:06:58
            10Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev †  Adriana L´opez-Alt ‡

            Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2010-09-15 14:13:14