Random oracle

Results: 199



#Item
131Random oracle / IP / NP / Randomized algorithm / RSA / Challenge-response authentication / Formal verification / Standard model / Cryptography / Public-key cryptography / Probabilistic complexity theory

Compact Proofs of Retrievability Hovav Shacham∗ [removed] Brent Waters† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2012-09-27 16:18:47
132Cryptographic primitive / Random oracle / Man-in-the-middle attack / Transport Layer Security / Password / Cryptographic hash function / Key / Secure Shell / Deniable authentication / Cryptography / Cryptographic protocols / Secure communication

Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-15 15:00:33
133Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
134HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
135Pseudorandom generator / Malleability / Commitment scheme / Semantic security / Provable security / Pseudorandom function family / Secure multi-party computation / Pseudorandom number generator / Cramer–Shoup cryptosystem / Cryptography / Random oracle / One-way function

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
136Cryptographic hash functions / Entropy / Information theory / Ring signature / Lamport signature / Advantage / Digital signature / Random oracle / XTR / Cryptography / Public-key cryptography / Randomness

Signature Schemes with Bounded Leakage Resilience Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:06:47
137Cryptographic protocols / IP / Non-interactive zero-knowledge proof / Random oracle / Interactive proof system / Proof of knowledge / Zero-knowledge proof / PP / Oracle machine / Cryptography / Theoretical computer science / Applied mathematics

Non-interactive zero-knowledge proofs in the quantum random oracle model Dominique Unruh University of Tartu July 29, 2014

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 10:21:03
138Public-key cryptography / Undeniable signature / Cryptographic protocol / Random oracle / Forking lemma / Ring signature / Key-agreement protocol / RSA / Group signature / Cryptography / Digital signature / Designated verifier signature

Special Signature Schemes and Key Agreement Protocols Caroline J. Kudla Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-22 10:47:54
139Cryptographic protocols / Computational hardness assumptions / Whitfield Diffie / Diffie–Hellman key exchange / Diffie–Hellman problem / Digital signature / Random oracle / Standard model / Hellman / Cryptography / Public-key cryptography / Key management

Non-Interactive Key Exchange and Key Assignment Schemes Eduarda Sim˜oes Veloso Freire Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-02-04 17:42:47
140Blind signature / Standard model / Random oracle / Public-key cryptography / RSA / GMR / Cryptography / Group signature / Digital signature

´ Ecole normale sup´ erieure D´ epartement d’Informatique

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-03-23 11:41:11
UPDATE