Random oracle

Results: 199



#Item
141Finite fields / Verifiable secret sharing / Digital signature / Secret sharing / XTR / Random oracle / RSA / Group signature / ElGamal signature scheme / Cryptography / Public-key cryptography / Key management

An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:18
142Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
143Probabilistic complexity theory / Complexity classes / Computability theory / Oracle machine / Advantage / Randomized algorithm / Random self-reducibility / PP / Reduction / Theoretical computer science / Computational complexity theory / Applied mathematics

Separation Results on the “One-More” Computational Problems Emmanuel Bresson1 , Jean Monnerat?2 , and Damien Vergnaud3 2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
144Oracle Database / Concrete security / Universal composability / Perfect forward secrecy / Ciphertext indistinguishability / Random oracle / Cryptography / Cryptographic protocols / Oracle machine

International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
145Diffie–Hellman key exchange / Station-to-Station protocol / Diffie–Hellman problem / Key-agreement protocol / XTR / Advantage / Random self-reducibility / Public-key cryptography / Oracle machine / Cryptography / Cryptographic protocols / MQV

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
146Cryptographic hash functions / Password-authenticated key agreement / One-way function / Password / Trapdoor function / RSA / Zero-knowledge proof / Random oracle / Isomorphism / Cryptography / Cryptographic protocols / Public-key cryptography

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
147Public-key cryptography / Diffie–Hellman key exchange / Communications protocol / Key-agreement protocol / Oracle machine / Random oracle / Cryptography / Cryptographic protocols / Advantage

An extended abstract of this work appeared in: The 4th International Conference on Autonomic and Trusted Computing (ATC ’07) (July 11–[removed], Hong-Kong, China) B. Xiao, L. T. Yang, J. Ma, C. Muller-Schloer and Y. Hu

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
148Random oracle / Universal composability / Public-key cryptography / Oracle Corporation / Diffie–Hellman key exchange / Oracle Database / IP / Security parameter / Cryptography / Cryptographic protocols / Advantage

Annual Symposium on InformAtion, Computer and Communications Security – Proceedings of ACM ASIA CCS ’08 (March 18–20, 2008, Tokyo, JP) V. Gligor and M. Abe, Eds., ACM Press, pages ????–???? Securing Group Key Exc

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
149Computational complexity theory / Computability theory / Random oracle / Advantage / Oracle machine / Oracle Database / Low / Oracle Corporation / IP / Cryptography / Theoretical computer science / Applied mathematics

Time-Lock Puzzles in the Random Oracle Model Mohammad Mahmoody1 , Tal Moran2 , and Salil Vadhan?2 1 Department of Computer Science, Cornell University [removed]; http://www.cs.cornell.edu/˜mohammad/

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English - Date: 2011-06-17 11:55:54
150Advantage / Cipher / RSA / Random oracle / Probabilistic encryption / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30
UPDATE