Random oracle

Results: 199



#Item
151NTRU / Cryptosystem / Random oracle / Public-key cryptography / Cryptography / Post-quantum cryptography / Ciphertext indistinguishability

Report on Present State of NTRU Cryptosystem Evaluation (screening evaluation) January 28, 2002 Jun Kogure, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
152Elliptic curve cryptography / Digital signature / Provable security / Generic group model / Public-key cryptography / Random oracle / Elliptic curve / Cryptography / CRYPTREC / Elliptic Curve DSA

Report on Present State of ECDSA Evaluation (full evaluation) January 28, 2002 Atsushi Shimbo, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
153Semantic security / Hybrid cryptosystem / Integrated Encryption Scheme / Random oracle / Key encapsulation / Standard model / Cryptography / Public-key cryptography / CRYPTREC

Report on Present State of PSEC-KEM Cryptosystem Evaluation (screening evaluation) January 28, 2002 Natsume Matsuzaki, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
154Hashing / Search algorithms / Preimage attack / Collision resistance / Merkle–Damgård construction / JH / Collision attack / Hash function / Random oracle / Cryptography / Cryptographic hash functions / NIST hash function competition

SHA-3 Conference, March 2012, Improved Indifferentiability Security Bound for the JH Mode Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:56:40
155Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
156Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
157Random oracle / Key / Semantic security / Digital signature / Cryptography / Public-key cryptography / Key management

How to Leak on Key Updates Allison Lewko ∗ University of Texas at Austin [removed] Mark Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-04 15:59:12
158Random oracle / Digital signature / Standard model / RSA / Cramer–Shoup cryptosystem / Public key certificate / Strong RSA assumption / Advantage / BLS / Cryptography / Public-key cryptography / Group signature

Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-08 16:56:54
159ID-based encryption / Elliptic curve cryptography / Cryptographic protocol / RSA / PKCS / Random oracle / Digital signature / Cryptanalysis / Encryption / Cryptography / Public-key cryptography / Radio-frequency identification

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 13:20:40
160Random oracle / Public-key cryptography / Authentication protocol / Smart card / Key-agreement protocol / Perfect forward secrecy / Cryptography / Cryptographic protocols / Advantage

A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-22 11:29:49
UPDATE