XTR

Results: 836



#Item
701Algebra / Group theory / Finite fields / Ropework / Cryptographic protocols / Braid group / Braid theory / XTR / Braid / Abstract algebra / Cryptography / Knot theory

ENTITY AUTHENTICATION SCHEMES USING BRAID WORD REDUCTION ´ SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT HERVE Abstract. Artin’s braid groups currently provide a promising background for cryptographical applications, sin

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2005-05-09 03:57:37
702Post-quantum cryptography / Quantum cryptography / Key size / Quantum computer / NTRU / Digital signature / Elliptic Curve DSA / Cipher / XTR / Cryptography / Public-key cryptography / Key management

Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2009-01-22 19:45:07
703XTR / FO / Tutte polynomial / Classical cipher / Mathematics / Mathematical analysis / Theoretical computer science

VOLUME 4, ISSUE 3 MARCH 27, 2009

Add to Reading List

Source URL: www.gifted.uconn.edu

Language: English - Date: 2009-03-27 11:42:32
704Semantic security / Advantage / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Ciphertext indistinguishability / Cryptography / Finite fields / Cryptographic protocols

CS255: Introduction to Cryptography Winter 2014 Assignment #2: Solutions Answer 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-15 12:14:59
705Soundness / XTR / Interactive proof system / Arthur–Merlin protocol / NP / Theoretical computer science / Applied mathematics / IP

Distinguishing Distributions Using Chernoff Information Thomas Baign`eres1, Pouyan Sepehrdad2 , and Serge Vaudenay2

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
706Modular arithmetic / Public-key cryptography / Group theory / Finite fields / RSA / Quadratic residue / XTR / Discrete logarithm / Prime number / Abstract algebra / Cryptography / Mathematics

Notes on Public Key Cryptography And Primality Testing Part 1: Randomized Algorithms

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-05 08:36:20
707Cryptographic hash function / Digital signature / Hash function / XTR / Blind signature / Lamport signature / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2003

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49
708Goldwasser–Micali cryptosystem / Randomized algorithm / XTR / Cryptography / Public-key cryptography / Electronic commerce

randomness Luca Trevisan University of California, Berkeley

Add to Reading List

Source URL: www.math.uni-heidelberg.de

Language: English - Date: 2009-07-30 07:35:15
709Computer science / Computational complexity theory / Time complexity / XTR / Permutations / Euclidean algorithm / Randomized algorithm / Applied mathematics / Analysis of algorithms / Mathematics

Optimal Random Sampling from Distributed Streams Revisited Srikanta Tirthapura1 and David P. Woodruff2 1 2

Add to Reading List

Source URL: home.engineering.iastate.edu

Language: English - Date: 2011-07-04 12:38:38
710XTR / Models of computation / Automata theory / Pushdown automaton

1 Language Theory and Infinite Graphs Colin Stirling School of Informatics University of Edinburgh

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2006-02-02 08:38:18
UPDATE