Cryptosystem

Results: 355



#Item
71RSA / Blum–Goldwasser cryptosystem / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-09-07 12:28:06
72RSA / Rabin cryptosystem / Ciphertext / Cipher / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

The BlueJay Ultra-Lightweight Hybrid Cryptosystem

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:20
73Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 05:32:22
74Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Paillier cryptosystem / Modular exponentiation / Exponentiation by squaring / Chinese remainder theorem / Montgomery reduction / Cryptography / Mathematics / Modular arithmetic

A Method for Preventing "Skipping" Attacks

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:05
75Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-05-05 15:39:42
76Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-04-02 08:24:08
77ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
78Homomorphic encryption / Paillier cryptosystem / Deterministic encryption / HTTP Secure / ElGamal encryption / Encryption software / RSA / Cryptography / Public-key cryptography / Cryptographic software

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
79Vigenère cipher / Caesar cipher / RSA / Cryptosystem / Index of cryptography articles / Three-pass protocol / Cryptography / Public-key cryptography / Cipher

CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

Add to Reading List

Source URL: hkumath.hku.hk

Language: English - Date: 2014-11-18 19:29:03
80RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
UPDATE