RSA problem

Results: 73



#Item
51Anonymous veto network / Dining cryptographers problem / Secure multi-party computation / RSA / Transmission Control Protocol / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

The Power of Anonymous Veto in Public Discussion Feng Hao1 and Piotr Zieli´ nski2, 1

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-10 14:54:54
52Electronic commerce / Proof of knowledge / Lattice problem / RSA / Zero-knowledge proof / IP / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

ISSN[removed]Research Reports on Mathematical and Computing Sciences

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:07
53Cryptographic hash function / Proxy re-encryption / Lattice problem / Digital signature / NTRU / One-way function / Learning with errors / RSA / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Public-key cryptography

Cryptography with Lattices 07D37042 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2011-01-31 08:38:01
54Mathematics / Applied mathematics / RSA / Lattice problem / Ciphertext indistinguishability / Ciphertext / Mathematical sciences / Rabin cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Multi-Bit Cryptosystems based on Lattice Problems Akinori Kawachi∗ Keisuke Tanaka∗ Keita Xagawa∗ Abstract We propose multi-bit versions of several single-bit cryptosystems based on lattice problems, the error-free

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:00
55Side channel attack / Full Domain Hash / Cryptanalysis / Diffie–Hellman problem / RSA / Cryptographic primitive / Index of cryptography articles / Cryptography / Public-key cryptography / PKCS

1 Jean-S´ ebastien Coron Curriculum Vitae

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-06-06 06:50:45
56Finite fields / Cryptographic protocols / Homomorphic encryption / Diffie–Hellman problem / Strong RSA assumption / RSA / Elliptic curve cryptography / Actor model / Eurocrypt / Cryptography / Public-key cryptography / Computational hardness assumptions

Victor Shoup Curriculum Vitae Feb. 6, 2014 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2014-02-06 21:21:47
57ElGamal encryption / RSA / Homomorphic encryption / Ordinal number / Applied mathematics / Public-key cryptography / Mathematics / Paillier cryptosystem

Solving the Discrete Logarithm Problem for Packing Candidate Preferences James Heather1 , Chris Culnane1 , Steve Schneider1 , Sriramkrishnan Srinivasan and Zhe Xia2 * 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
58Electronic commerce / Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / ElGamal encryption / RSA / Diffie–Hellman problem / XTR / CEILIDH / Cryptography / Public-key cryptography / Cryptographic protocols

2.3. Diffie–Hellman key exchange[removed]

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:43:17
59Blind signature / Electronic voting / Dining cryptographers problem / David Chaum / RSA / XTR / Cryptography / Financial cryptography / Public-key cryptography

LNCS[removed]Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA

Add to Reading List

Source URL: www.cs.elte.hu

Language: English - Date: 2006-03-02 14:49:50
UPDATE