Random oracle

Results: 199



#Item
71Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
72Proof theory / Zero-knowledge proof / Interactive proof system / Commitment scheme / IP / Soundness / Probabilistically checkable proof / Random oracle / Symbol / Cryptography / Theoretical computer science / Cryptographic protocols

— A merged version of this work and the work of [BGW12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 13:39:52
73Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
74Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
75Side channel attack / Advantage / Cryptography / Random oracle / Public-key cryptography

On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-20 20:07:33
76Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
77Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
78Finite fields / Computability theory / Cryptographic protocols / Computational complexity theory / Diffie–Hellman problem / XTR / Random self-reducibility / Oracle machine / Reduction / Theoretical computer science / Applied mathematics / Mathematics

Irreducibility to the One-More Evaluation Problems: More May Be Less Daniel R. L. Brown∗ June 9, 2010 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-09 14:57:08
79Random oracle / Structure / XTR / Oracle machine / Cryptography / Finite fields / Schnorr signature

More Short Signatures without Random Oracles Victor K. Wei and Tsz Hon Yuen Dept. of Information Engineering, The Chinese Univ. of Hong Kong, Hong Kong {kwwei,thyuen4}@ie.cuhk.edu.hk January 8, 2006

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-01-08 02:15:25
80Random oracle / Blind signature / Oracle Corporation / Digital signature / Oracle Database / Standard model / Anonymity / United States dollar / Cryptography / Public-key cryptography / Financial cryptography

Fair Multiple-bank E-cash in the Standard Model∗ Jiangxiao Zhang1 , Yanwu Gao1 , Chunhui Feng1 , Hua Guo2 , Zhoujun Li2 1 2 Mathematics and Information Technology Institute, Xingtai University, Xingtai, Hebei,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:48:26
UPDATE