Cryptographic primitive

Results: 89



#Item
11Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
12Computational hardness assumption / Ciphertext indistinguishability / Computer security / Cyberwarfare / Science / Cryptography / Cryptographic primitive / Information-theoretic security

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
13Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
14Java platform / Formal methods / Logic in computer science / Formal verification / Cryptographic primitive / KeY / Cryptography / Java Card / Cryptographic protocol / Computing / Theoretical computer science / Formal sciences

Poster: Security in E-Voting Daniel Bruns† , Huy Quoc Do‡ , Simon Greiner† , Mihai Herda† , Martin Mohr† , Enrico Scapin∗ , Tomasz Truderung∗ , Bernhard Beckert† , Ralf Küsters∗ , Heiko Mantel‡ and R

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:19
15Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

Add to Reading List

Source URL: securitydriven.net

Language: English - Date: 2015-04-04 22:36:18
16Function / XTR / Computability theory / Model theory / Μ operator / Primitive recursive function / Mathematics / Mathematical logic / Functions and mappings

Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3 Santiago Zanella1,3

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
17Function / XTR / Computability theory / Model theory / Μ operator / Primitive recursive function / Mathematics / Mathematical logic / Functions and mappings

Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3 Santiago Zanella1,3

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
18Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
19Information / Cryptographic protocols / Free software / ProVerif / Ciphertext indistinguishability / Communications protocol / Cryptographic primitive / Authentication / Tor / Cryptography / Cryptographic software / Data

Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-21 15:33:34
20Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 07:10:50
UPDATE