Random oracle

Results: 199



#Item
161Proprietary software / Oracle Database / Microsoft SQL Server / Workstation / SCSI / Synchronous dynamic random-access memory / Relational database management systems / Software / Computing

Microsoft Word - Computer hardware and software requirements_vista-June2010.doc

Add to Reading List

Source URL: www.csdrms.org

Language: English - Date: 2010-06-09 11:02:51
162Homomorphic encryption / Database schema / Public-key cryptography / Random oracle / ID-based encryption / Cryptography / Ciphertext indistinguishability / Obfuscation

Towards a Unified Theory of Cryptographic Agents Shashank Agrawal ∗ Shweta Agrawal

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-23 06:42:41
163One-way function / Cryptographic hash function / Lattice / Hash function / Ideal lattice cryptography / Random oracle / Collision resistance / Trapdoor function / Cryptography / Lattice-based cryptography / Lattice problem

A Compact Signature Scheme with Ideal Lattice (Extended Abstract) Keita Xagawa ∗ Keisuke Tanaka ∗

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04
164Optimal asymmetric encryption padding / RSA / Padding / Block cipher / Cipher / Random oracle / Cryptography / Public-key cryptography / Signcryption

Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis† Michael J. Freedman† Stanislaw Jarecki‡

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:05:14
165Authentication protocol / Diffie–Hellman key exchange / Public-key cryptography / Password authentication protocol / Random oracle / Key-agreement protocol / Cryptography / Cryptographic protocols / Internet protocols

Authentication for Paranoids: Multi-Party Secret Handshakes Stanislaw Jarecki, Jihye Kim, and Gene Tsudik Computer Science Department University of California, Irvine {stasio, jihyek, gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2006-07-12 12:31:28
166Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / Malleability / Random oracle / Mihir Bellare / Semantic security / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
167RSA / Digital signature / Verifiable secret sharing / XTR / Group signature / Index of cryptography articles / Cryptography / Public-key cryptography / Random oracle

Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
168Soft error / RAM parity / Dynamic random-access memory / DIMM / Random-access memory / Sun Microsystems / Page fault / Sun Enterprise / Chipkill / Computer memory / Computer hardware / Computing

Soft Memory Errors and Their Effect on Sun Fire™ Systems

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2010-12-20 08:39:06
169Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
170Chosen-ciphertext attack / Padding / RSA / Advantage / Random oracle / Block cipher / Ciphertext / Cipher / Stream cipher / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

An OAEP Variant With a Tight Security Proof – Draft 1.0 Jakob Jonsson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-03-18 14:07:36
UPDATE