Elgamal

Results: 165



#Item
111Cryptographic protocols / Ciphertext indistinguishability / ProVerif / ElGamal encryption / Digital signature / Cramer–Shoup cryptosystem / RSA / Cryptographic primitive / Computer security / Cryptography / Public-key cryptography / Electronic commerce

MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational Proofs

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-09-28 08:57:21
112Finite fields / Verifiable secret sharing / Digital signature / Secret sharing / XTR / Random oracle / RSA / Group signature / ElGamal signature scheme / Cryptography / Public-key cryptography / Key management

An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:18
113Key management / Paillier cryptosystem / Ciphertext indistinguishability / ElGamal encryption / Adaptive chosen-ciphertext attack / Hybrid cryptosystem / Cryptography / Public-key cryptography / Key encapsulation

Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:20
114Digital signature / Malleability / ElGamal encryption / Blind signature / Subliminal channels / Cryptography / Public-key cryptography / RSA

Digital Signatures Do Not Guarantee Exclusive Ownership Thomas Pornin and Julien P. Stern Cryptolog International, Paris, France [removed] and [removed]

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
115Cryptographic protocols / ElGamal encryption / Cipher / Key / Man-in-the-middle attack / RSA / Diffie–Hellman key exchange / ID-based encryption / Threshold cryptosystem / Cryptography / Public-key cryptography / Key management

Time-Lapse Cryptography Technical Report TR[removed]Michael O. Rabin∗ Christopher Thorpe

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2006-12-20 15:07:12
116Onion routing / Routing / Crowds / Peer-to-peer / ElGamal encryption / Tor / Traffic analysis / Cryptography / Internet privacy / Public-key cryptography

MoP-2-MoP – Mobile private microblogging Marius Senftleben1,2 , Mihai Bucicoiu1,2 , Erik Tews1 , Frederik Armknecht3 , Stefan Katzenbeisser1,2 , and Ahmad-Reza Sadeghi1,2 1 CASED/Technische Universit¨

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:17:37
117Email / Cryptographic protocols / Virtual communities / RSA / Internet forum / Zero-knowledge proof / ElGamal encryption / Usenet / Cryptography / Public-key cryptography / Online chat

PDF Document

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2005-12-15 09:26:02
118Cryptographic protocols / Key management / Internet standards / Taher Elgamal / Transport Layer Security / HTTP Secure / Qualys / Public key certificate / Cryptography / Secure communication / Electronic commerce

Shannon Hutto Bateman Group[removed]removed] Jo Lee

Add to Reading List

Source URL: www.trustworthyinternet.org

Language: English - Date: 2012-11-27 16:57:16
119RSA / Cipher / Diffie–Hellman key exchange / ElGamal encryption / Index of cryptography articles / Affine cipher / Cryptography / Public-key cryptography / Electronic commerce

Public-Key Crypto Basics Paul Garrett [removed]

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 13:40:47
120Cryptographic protocols / RSA / Diffie–Hellman key exchange / ElGamal encryption / Cipher / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Electronic commerce

Intro to public-key ciphers A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. A asymmetric or public-key cipher is one

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 14:27:26
UPDATE