Cryptographic primitive

Results: 89



#Item
21Cryptography / Communications protocol / Cryptographic primitive / Dines Bjørner / Computing / Data / Information / Cryptographic protocols

T (+ u (+ B Í http://www.lsv.ens-cachan.fr/~delaune/ Stéphanie Delaune

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-01 04:59:16
22RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
23Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
24FIPS 140-2 / NTRU / Cryptosystem / Mathematics / Algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

Joshua Erin Hill Curriculum Vitæ H () – B

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2014-11-09 13:39:22
25FIPS 140-2 / Cryptographic primitive / Block cipher / Key generation / Key / Symmetric-key algorithm / Random number generation / Algorithm / Computer security / Cryptography / Key management / Formal sciences

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2014-12-30 15:45:55
26Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
27RSA / Adversary / Cryptographic primitive / Cryptography / Public-key cryptography / Side channel attack

SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-23 06:54:05
28Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
29Malware / OO / Tor / Badbunny / Cryptographic primitive / Macintosh / Software / Portable software / OpenOffice.org

OpenOffice v3.x Security Design Weaknesses Eric Filiol

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
30Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:37:13
UPDATE