Signcryption

Results: 30



#Item
11Public-key cryptography / Encryption / Digital signature / One-time pad / Key / Probabilistic encryption / Semantic security / Cryptography / Cipher / Signcryption

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
12Authenticated encryption / Semantic security / RSA / ElGamal encryption / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Signcryption / Ciphertext / Malleability / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
13Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
14Public-key cryptography / Open formats / Markup languages / XML / Digital signature / Signcryption / Oxygen XML Editor / Office Open XML / Cryptography / Computing / Computer file formats

Version 0.3 Axantum Strong Software Licensing Svante Seleborg Axantum Software AB [removed]

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
15Semantic security / Adaptive chosen-ciphertext attack / Cramer–Shoup cryptosystem / Chosen-ciphertext attack / Advantage / Ciphertext / RSA / Cipher / Key-recovery attack / Cryptography / Signcryption / Ciphertext indistinguishability

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-20 21:27:06
16Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
17Key management / Security / Applied mathematics / Digital signature / Signcryption / RSA / ID-based encryption / Key / Malleability / Cryptography / Public-key cryptography / Cyberwarfare

A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:43
18FIPS 140-2 / Advanced Encryption Standard / Computer security / Key Wrap / Signcryption / Cryptography / Cryptographic software / Encryption

The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple

Add to Reading List

Source URL: www.taxadmin.org

Language: English - Date: 2014-10-16 15:56:57
19Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Advantage / Cryptography / Public-key cryptography / Signcryption

Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-28 03:00:32
20Hashing / HAVAL / Signcryption / PKC / Cryptographic hash function / Cryptography / Year of birth missing / Yuliang Zheng

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:29:14
UPDATE