XTR

Results: 836



#Item
721Cyberwarfare / Boneh/Franklin scheme / XTR / Advantage / Polynomial / Security / Applied mathematics / Cryptography / Ciphertext indistinguishability / ID-based encryption

Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme Liqun Chen1 and Zhaohui Cheng2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-31 15:06:27
722Biology / Barbs / Barbus / Data quality / C / XTR / Computing / Procedural programming languages / Software engineering

NATURA[removed]STANDARD DATA FORM For Special Protection Areas (SPA), Proposed Sites for Community Importance (pSCI),

Add to Reading List

Source URL: www20.gencat.cat

Language: English - Date: 2014-02-26 13:44:38
723Conservation / Tablas de Daimiel National Park / Anas / XTR

NATURA[removed]STANDARD DATA FORM For Special Protection Areas (SPA), Proposed Sites for Community Importance (pSCI),

Add to Reading List

Source URL: www.castillalamancha.es

Language: English - Date: 2013-09-05 08:37:10
724Applied mathematics / Mathematics / XTR / Symbol / IP

Practical & Provably Secure Distance-Bounding Ioana Boureanu1 , Aikaterini Mitrokotsa2 , and Serge Vaudenay3 1

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2013-11-08 08:15:37
725Joint Electronics Type Designation System / Generalitat of Catalonia / Electronic engineering / Telecommunications engineering / Military technology / Barbs / Barbus / XTR

NATURA[removed]STANDARD DATA FORM For Special Protection Areas (SPA), Proposed Sites for Community Importance (pSCI),

Add to Reading List

Source URL: www20.gencat.cat

Language: English - Date: 2014-02-26 13:44:45
726Blind signature / Electronic voting / Dining cryptographers problem / David Chaum / RSA / XTR / Cryptography / Financial cryptography / Public-key cryptography

LNCS[removed]Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA

Add to Reading List

Source URL: www.cs.elte.hu

Language: English - Date: 2006-03-02 14:49:50
727Commitment scheme / XTR / Homomorphic encryption / Electronic voting / Blind signature / Zero-knowledge proof / Homomorphic secret sharing / Cryptography / Verifiable secret sharing / Public-key cryptography

In Advances in Cryptology—EUROCRYPT’96, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1996. pp[removed]Multi-Authority Secret-Ballot Elections with

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:11
728Finite fields / RSA / Integer factorization algorithms / Blind signature / Digital signature / XTR / RSA Factoring Challenge / RSA numbers / Cryptography / Public-key cryptography / Electronic commerce

The One-More-RSA-Inversion Problems and the Security of Chaum’s Blind Signature Scheme∗ M. Bellare†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-06-17 02:02:47
729Algebra / QUAD / Keystream / Quadratic form / RC4 / Pseudorandom number generator / Hidden Field Equations / XTR / Quadratic / Cryptography / Stream ciphers / Mathematics

QUAD: a Practical Stream Cipher with Provable Security Cˆ

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
730Post-quantum cryptography / Algebraic geometry / Cryptography / Multivariate cryptography / Finite fields / Polynomials / QUAD / Monomial / XTR / Algebra / Abstract algebra / Mathematics

Efficient Implementations of Multivariate Quadratic Systems

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
UPDATE