RSA problem

Results: 73



#Item
11Internet protocols / Internet standards / Software token / Authentication / RADIUS / Transaction authentication number / Access token / Password / One-time password / Security / Computer security / Security token

CAT - ONLINE IDENTITY PROTECTION! Do you have the same problem ? "With CAT we succeeded to wake up from a nightmare of handling RSA cards, for thousands of employees, tracking who lost it, who forgot it or who just left

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2009-08-11 05:39:52
12Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
13Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
14National security / Cyberwarfare / Electronic warfare / Hacking / Military technology / Computer security / RSA / Computer crimes / Security / Crime

“In this rapidly changing digital world it is crucial to be innovative. Being three months ahead is considered far, we try to stay two years ahead of any problem.” SID NL and Humanity House BREAD & BRAINS with Ida Ha

Add to Reading List

Source URL: sidnl.org

Language: English - Date: 2015-01-26 05:24:19
15Information flow / Static single assignment form / Variable / RSA / Scope / Mathematics / Information theory / Data-flow analysis

Secure Information Flow as a Safety Problem ⋆ Tachio Terauchi1 and Alex Aiken2 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-06-08 16:56:42
16Cryptographic protocols / Finite fields / Diffie–Hellman problem / Oblivious transfer / RSA / XTR / Decisional Diffie–Hellman assumption / Decision Linear assumption / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Computational hardness assumptions

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-14 14:00:36
17Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
18Blind signature / Group signature / ElGamal encryption / RSA / Paillier cryptosystem / XTR / Diffie–Hellman problem / Homomorphic encryption / Commitment scheme / Cryptography / Public-key cryptography / Digital signature

Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-05-20 02:15:48
19Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
20Electronic commerce / Learning with errors / Machine learning / XTR / Normal distribution / Diffie–Hellman key exchange / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Finite fields

A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin University of Cincinnati Chinese Academy of Sciences Rutgers University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 14:01:16
UPDATE