Cryptosystem

Results: 355



#Item
1

An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ ur Experimentelle Mathematik, Universit¨ at Duisburg-Essen, Germany and

Add to Reading List

Source URL: www.mathematik.uni-leipzig.de

Language: English - Date: 2012-06-01 09:23:20
    2

    Communication services empowered with a classical chaos based cryptosystem G. Vidal 1 Institute of Physics

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2013-03-27 20:42:00
      3

      FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

      Add to Reading List

      Source URL: www.math.fau.edu

      Language: English - Date: 2018-04-24 10:30:54
        4

        Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:43:59
          5

          Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa University of Tartu, Tartu, Estonia Abstract. Given a well-chosen additively homomorphic cryptosystem and a ⌃ protocol with linear answer, Damg˚

          Add to Reading List

          Source URL: fc17.ifca.ai

          - Date: 2017-03-17 12:03:55
            6

            NTRU: A PUBLIC KEY CRYPTOSYSTEM NTRU Cryptosystems, Inc. (www.ntru.com) Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman

            Add to Reading List

            Source URL: grouper.ieee.org

            - Date: 2008-04-27 09:53:40
              7

              True Key™ by Intel Security Security White Paper 2.0 Table of Contents Introduction ................................................1 Cryptosystem .............................................1

              Add to Reading List

              Source URL: b.tkassets.com

              - Date: 2016-05-16 11:21:57
                8

                Contemporary Mathematics Breaking the Akiyama-Goto cryptosystem Petar Ivanov and Jos´e Felipe Voloch Abstract. Akiyama and Goto have proposed a cryptosystem based on rational points on curves over function fields (stat

                Add to Reading List

                Source URL: www.ma.utexas.edu

                - Date: 2008-10-31 13:20:26
                  9

                  Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

                  Add to Reading List

                  Source URL: zoo.cs.yale.edu

                  - Date: 2013-10-07 23:40:04
                    10

                    The Security of a Mix-Center Based on a Semantically Secure Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

                    Add to Reading List

                    Source URL: www.nada.kth.se

                    - Date: 2012-05-30 08:33:53
                      UPDATE