RSA problem

Results: 73



#Item
1

Exploratory Group Problem: RSA Encryption K. Stange November 5, 2008 This problem counts as THREE exploratory problems. It requires working in a group of at least two people, and at most four. You should submit ONE set o

Add to Reading List

Source URL: math.colorado.edu

- Date: 2015-10-18 16:52:56
    2Cryptography / Computational complexity theory / Knapsack problem / Cipher / Public-key cryptography / Encryption / Symmetric-key algorithm / Key / P versus NP problem / MerkleHellman knapsack cryptosystem / RSA

    Public Key Cryptography Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

    Add to Reading List

    Source URL: bioinfo.ict.ac.cn

    Language: English - Date: 2014-11-28 11:05:21
    3Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

    1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    4Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

    THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2015-05-02 08:19:13
    5Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

    CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-01 19:29:53
    6Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

    Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2011-05-05 15:39:42
    7Cryptographic protocols / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / XTR / Discrete logarithm / ElGamal encryption / Subliminal channels / RSA / Cryptography / Computational hardness assumptions / Finite fields

    Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

    Add to Reading List

    Source URL: book.huihoo.com

    Language: English - Date: 2006-07-27 09:21:33
    8NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

    Practical Lattice-based Digital Signature Schemes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-09 11:42:22
    9Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography

    Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

    Add to Reading List

    Source URL: www.boazbarak.org

    Language: English - Date: 2011-10-10 23:51:30
    UPDATE