Cryptosystem

Results: 355



#Item
61Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1999-02-17 16:51:49
62Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
63Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2010-11-25 08:58:28
64Public-key cryptography / Categorical data / Electronic commerce / Logistic regression / XTR / Linear regression / RSA / Paillier cryptosystem / Mental poker / Statistics / Regression analysis / Econometrics

2015 IEEE CS Security and Privacy Workshops Privacy-Preserving Statistical Analysis by Exact Logistic Regression David A. duVerle∗† , Shohei Kawasaki‡ , Yoshiji Yamada§ , Jun Sakuma‡¶ and Koji Tsuda∗

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:25:23
65

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

- Date: 2007-06-02 00:48:30
    66

    Attack on A New Public Key Cryptosystem from ISC’02 (LNCSFangguo Zhang1 Shengli Liu2 and Kwangjo Kim1 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2002-11-21 02:42:12
      67

      Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

      Add to Reading List

      Source URL: imi.kyushu-u.ac.jp

      Language: English - Date: 2007-03-14 18:37:42
        68

        A New Public Key Cryptosystem with Key Escrow Capabilities Ruxandra Olimid University of Bucharest

        Add to Reading List

        Source URL: ruxandraolimid.weebly.com

        Language: English - Date: 2013-05-14 13:32:29
          69Advantage / RSA / One-time pad / Ciphertext / Probabilistic encryption / Blum–Goldwasser cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

          Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2013-04-25 09:16:13
          UPDATE