ElGamal encryption

Results: 138



#Item
31Federated identity / System software / Security / Identity provider / Public key certificate / ElGamal encryption / Public-key cryptography / Identity management / Computer security

Microsoft PowerPoint - IRMA eID 0.3.pptx

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-08 08:50:17
32Hardware security module / XTR / Key management / Pseudonymity / Security Assertion Markup Language / PKCS / Cryptography / Public-key cryptography / ElGamal encryption

Werking van het eID Stelsel

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-23 06:24:06
33Ciphertext / RSA / Block cipher modes of operation / Cipher / ElGamal encryption / Semantic security / Symmetric-key algorithm / Blum–Goldwasser cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
34Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
35Ciphertext / RSA / ElGamal encryption / Boneh/Franklin scheme / Public-key cryptography / Adaptive chosen-ciphertext attack / Chosen-plaintext attack / Cipher / Chosen-ciphertext attack / Cryptography / Proxy re-encryption / ID-based encryption

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
36Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
37RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
38Homomorphic encryption / ElGamal encryption / Probabilistic encryption / Blind signature / Encryption / Ciphertext / Goldwasser–Micali cryptosystem / Cipher / Zero-knowledge proof / Cryptography / Public-key cryptography / Paillier cryptosystem

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
39Chosen-ciphertext attack / ElGamal encryption / Advantage / Chosen-plaintext attack / Hybrid cryptosystem / Integrated Encryption Scheme / Ciphertext / Cipher / RSA / Cryptography / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
40Chosen-ciphertext attack / Paillier cryptosystem / Advantage / Chosen-plaintext attack / ElGamal encryption / ID-based encryption / Probabilistic encryption / Cipher / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
UPDATE