Cryptography

Results: 21893



#Item
1Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:42
2Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-04-04 23:26:12
3Cryptography / Computational complexity theory / Theory of computation / Randomized algorithms / Complexity classes / Zero-knowledge proof / Interactive proof system / Quantum complexity theory / NP / IP / Soundness / Computational indistinguishability

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 2: Interactive Proofs 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
4Cryptography / Proof theory / Computational complexity theory / Zero-knowledge proof / Complexity classes / Soundness / IP / Zero knowledge / Interactive proof system / PSPACE / Mathematical proof / Proof of knowledge

The Art of Cryptography Zero Knowledge Proofs Abhiram Kothapalli Two Balls and the Color-Blind Friend

Add to Reading List

Source URL: abhiram.me

Language: English - Date: 2018-10-12 13:22:58
5Cryptography / Multivariate cryptography / Post-quantum cryptography / Algebra / Polynomials / Unbalanced Oil and Vinegar / Hidden Field Equations / Algebraic equation / QUAD / Variable / Equation / Finite field

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-31 09:28:56
6Algebra / Abstract algebra / Group theory / Mathematics / Coset / Group / Subgroup / Discrete logarithm / Finite field / Generating set of a group / Modular arithmetic / Field

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
7Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-06-21 04:41:26
8Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Theoretical computer science / Post-quantum cryptography / Applied mathematics / Mathematics

Tenth International Conference on Post-Quantum Cryptography PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

Add to Reading List

Source URL: pqcrypto2019.org

Language: English - Date: 2018-10-01 11:44:48
9Algebra / Mathematics / Abstract algebra / Polynomials / Computer algebra / Multivariate cryptography / Algebraic geometry / Equations / Hidden Field Equations / Factorization / Quadratic function / Grbner basis

Multivariate Public Key Cryptography Jintai Ding 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-10 22:42:02
10Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-12 10:43:16
UPDATE