Cryptology

Results: 302



#Item
51

The proceedings version of this papers, entitled The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs, appears in Advances in Cryptology – Eurocrypt 2006, LNCS vol. 4004, Springer, pp. 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-28 22:41:48
    52

    Publication List of Tor Helleseth up to 2012 Edited Books, Proceedings and Journal Special Issues [1] T. Helleseth, Ed., Advances in Cryptology - EUROCRYPT ’93, ser. Lecture Notes in Computer Science, volBerlin:

    Add to Reading List

    Source URL: www.ii.uib.no

    Language: English - Date: 2013-01-10 07:04:16
      53

      Simulatable Security and Polynomially Bounded Concurrent Composability Dennis Hofheinz CWI, Cryptology and Information Security Group Amsterdam, The Netherlands

      Add to Reading List

      Source URL: www.kjdf.de

      Language: English - Date: 2014-06-10 05:37:39
        54

        Mastermath Spring 2015 Exam Cryptology Course Tuesday, 09 JuneName

        Add to Reading List

        Source URL: hyperelliptic.org

        Language: English - Date: 2015-06-15 17:39:18
          55

          To appear in Journal of Cryptology. Efficient Cryptosystems From 2k -th Power Residue Symbols? Fabrice Benhamouda1 , Javier Herranz2 , Marc Joye3 , and Benoît Libert4,?? 1

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-11-22 13:28:27
            56

            Towards Key-Dependent Message Security in the Standard Model Dennis Hofheinz1 and Dominique Unruh2 1 CWI, Cryptology and Information Security Group, Amsterdam, The Netherlands,

            Add to Reading List

            Source URL: www.kjdf.de

            Language: English - Date: 2014-06-10 05:37:35
              57Cryptography / Public-key cryptography / Password-authenticated key agreement / Eurocrypt / International Cryptology Conference / Asiacrypt / Digital signature / RSA

              Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

              Add to Reading List

              Source URL: www.normalesup.org

              Language: English - Date: 2016-06-01 09:22:58
              58

              Table of Contents 1 Introduction to Cryptography and Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Overview on the Field of Cryptology (and this Book) .

              Add to Reading List

              Source URL: wiki.crypto.rub.de

              Language: English
                59

                An extended abstract of this paper appears in Advances in Cryptology – CRYPTO ’08, Lecture Notes in Computer Science Vol. 5157, D. Wagner ed., Springer-Verlag, 2008. This is the full version. Programmable Hash Functi

                Add to Reading List

                Source URL: www.kjdf.de

                Language: English - Date: 2014-06-10 05:37:38
                  60

                  Conditional Reactive Simulatability Michael Backes1 , Markus Dürmuth1 , Dennis Hofheinz2 , and Ralf Küsters3 1 Saarland University, {backes|duermuth}@cs.uni-sb.de CWI, Cryptology and Information Security Group, Prof. D

                  Add to Reading List

                  Source URL: www.kjdf.de

                  Language: English - Date: 2014-06-10 05:37:32
                    UPDATE