Eprint

Results: 2085



#Item
811Ring theory / Finite fields / Theoretical computer science / Diffie–Hellman problem / XTR / Polynomial ring / Algorithm / Ring / Naor-Reingold Pseudorandom Function / Abstract algebra / Algebra / Mathematics

Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp , Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-30 10:17:55
812Lion-reclining / Hand / Vulture / Stool-or-mat / Quail chick / Foot / Jar stand / Viper / Cryptography / Egyptian hieroglyphs / Cryptographic protocols / XTR

Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols Xi-Jun Lin ∗and Lin Sun †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 08:56:00
813Key management / Notary / NP / IP / Cryptography / Public-key cryptography / Digital signature

A server-aided verification signature scheme without random oracles Bin Wang and Qing Zhao Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mai

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 07:37:45
814Advantage / Project Nike / ElGamal encryption / Diffie–Hellman key exchange / Ciphertext indistinguishability / Standard model / Random oracle / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Public-key cryptography / Cryptographic protocols

Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 16:38:11
815Complement / Intervals

TPy6A-submission-GS-4-ePrint.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-29 18:40:40
816Hash function / RSA / BLS / Lamport signature / Cryptography / Digital signature / Cryptographic hash function

Chameleon Signature from Bilinear Pairing

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 03:10:04
817Computer programming / Mathematics / Hashing / Search algorithms / Error detection and correction / Space–time tradeoff / CPU cache / Dynamic random-access memory / Hash function / Computing / Software optimization / Computer memory

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 04:22:19
818Cryptography / One-way function / Injective function / Integration by substitution / Function / Continuous mapping theorem / Mathematics / Mathematical analysis / Functions and mappings

Simple composition theorems of one-way functions – proofs and presentations Jaime Gaspar∗ Eerke Boiten†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 09:03:22
819Bitcoin / Peer-to-peer computing / Cryptography / Commitment scheme / Communications protocol / Transmission Control Protocol / Transaction processing / Software / Computing / Data

Fair Two-Party Computations via Bitcoin Deposits? Marcin Andrychowicz?? , Stefan Dziembowski? ? ? , Daniel Malinowski† and Łukasz Mazurek‡ University of Warsaw Abstract. We show how the Bitcoin currency system (wit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-03-05 13:11:24
820Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
UPDATE