Cryptosystem

Results: 355



#Item
31Public-key cryptography / Cryptography / Key management / DNSSEC / Domain Name System Security Extensions / Cryptographic hash function / Cryptosystem / Digital signature / Book:Cryptography / Index of cryptography articles

An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo carlos @ lacnic.net

Add to Reading List

Source URL: www.labs.lacnic.net

Language: English - Date: 2011-09-08 15:41:30
32Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Secure multi-party computation / Paillier cryptosystem / Communications protocol / Cryptographic protocol / Secret sharing / Data Encryption Standard

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
33

1 A “Differential” Attack on Polly Cracker Dennis Hofheinz and Rainer Steinwandt Abstract— We describe an attack on the public key cryptosystem Polly Cracker for which it is not necessary to know a superset of the

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:39
    34Integer factorization algorithms / Mathematics / Cryptography / Number theory / Quadratic sieve / Euclidean algorithm / RSA / Prime number / Factorization / Trial division / General number field sieve / Rational sieve

    FACTORIZATION TECHNIQUES ELVIS NUNEZ AND CHRIS SHAW Abstract. The security of the RSA public key cryptosystem relies upon the computational difficulty of deriving the factors of a particular semiprime modulus. In this pa

    Add to Reading List

    Source URL: davidlowryduda.com

    Language: English - Date: 2016-05-25 03:59:31
    35Cryptography / Public-key cryptography / Commitment scheme / Cryptographic hash function / CramerShoup cryptosystem / RSA / Crypt / Digital signature

    This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-02-21 09:51:42
    36Coding theory / Information theory / Discrete mathematics / Cryptography / Linear code / Parity-check matrix / McEliece cryptosystem / Generator matrix / Hamming code / ReedSolomon error correction / ReedMuller code / Hamming

    Code-based Cryptography Christiane Peters Technical University of Denmark ECC 2011

    Add to Reading List

    Source URL: ecc2011.loria.fr

    Language: English - Date: 2011-09-30 12:40:04
    37Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

    This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-02-21 09:51:42
    38Cryptography / E-commerce / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Modular exponentiation / Ciphertext / Cryptanalysis / BlumGoldwasser cryptosystem / Rabin cryptosystem

    Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

    Add to Reading List

    Source URL: iacr.org

    Language: English - Date: 2010-11-05 17:58:40
    39Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

    Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English - Date: 2015-09-17 04:43:33
    UPDATE