Strong cryptography

Results: 135



#Item
121Cryptographic hash functions / Pseudorandomness / Permutations / Pseudorandom permutation / Advantage / Block cipher / Random permutation / Universal hashing / Feistel cipher / Cryptography / Search algorithms / Hashing

A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation M´etodo Gen´erico para Extender el Espacio del Mensaje de una Permutaci´on Pseudo-aleatoria

Add to Reading List

Source URL: www.scielo.org.mx

Language: English - Date: 2010-01-06 17:07:45
122Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions

Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
123Strong RSA assumption / RSA problem / GMR / Cryptography / Public-key cryptography / RSA

ACE ACE

Add to Reading List

Source URL: www.ipa.go.jp

- Date: 2013-06-03 22:32:58
124RSA / Strong RSA assumption / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Cipher / Plaintext-aware encryption / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / RSA problem

RSA Problem Ronald L. Rivest, MIT Laboratory for Computer Science [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2003-12-18 14:24:00
125Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 13:50:14
126Numbers / Integer sequences / Finite fields / Primality tests / Prime number / Strong prime / Smooth number / Trial division / XTR / Mathematics / Cryptography / Integer factorization algorithms

THE POLLARD p − 1 FACTORIZATION ALGORITHM FRANCO CAFIERO

Add to Reading List

Source URL: math.arizona.edu

Language: English - Date: 2003-10-09 16:15:52
127/dev/random / Random number generation / Cryptographic hash function / Entropy / Padding / Fortuna / Pseudorandomness / Key / MD5 / Cryptography / Randomness / Pseudorandom number generators

Software Generation of Practically Strong Random Numbers Peter Gutmann Department of Computer Science

Add to Reading List

Source URL: www.cs.auckland.ac.nz

Language: English - Date: 1998-02-12 15:33:43
128Key management / Integer factorization algorithms / RSA / Strong prime / Key / Cipher / Cryptanalysis / RSA Factoring Challenge / RSA numbers / Cryptography / Public-key cryptography / Electronic commerce

IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Online): [removed]www.IJCSI.org

Add to Reading List

Source URL: www.ijcsi.org

Language: English - Date: 2012-04-04 19:55:03
129Internet privacy / International Traffic in Arms Regulations / Export of cryptography in the United States / Strong cryptography / Pretty Good Privacy / Export of cryptography / National Security Agency / Bureau of Industry and Security / Whitfield Diffie / Cryptography / Computer law / Key management

PDF Document

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2009-07-26 21:29:54
130Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cs.plu.edu

Language: English - Date: 2003-02-21 11:38:34
UPDATE