Eprint

Results: 2085



#Item
851Braid group / Centralizer and normalizer / Conjugacy class / Subgroup / Abstract algebra / Group theory / Algebra

A NEW KEY EXCHANGE PROTOCOL BASED ON THE DECOMPOSITION PROBLEM VLADIMIR SHPILRAIN AND ALEXANDER USHAKOV Abstract. In this paper we present a new key establishment protocol based on the decomposition problem in non-commut

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-08 10:08:03
852Abstract algebra / General number field sieve / Discriminant / Quadratic polynomial / Mathematics / Polynomials / Algebra

Polynomial Selection for Number Field Sieve in Geometric View Min Yang1 , Qingshu Meng2 , zhangyi Wang2 , Lina Wang2 , and Huanguo Zhang2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-06 21:23:52
853Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
854Formal languages / Mathematics / Longest common substring problem / Substring / Linguistics / Orbifold / Comparison of programming languages / Combinatorics / String / Dynamic programming

Traitor-Tracing on Binary Strings Michael J. Collins Sandia National Laboratories⋆ Albuquerque, NM USA 87185

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-23 13:49:52
855Secret sharing / Proactive secret sharing / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Key management

Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 10:57:06
856Support / Dirac measure / Applied mathematics / PP / Measure theory / Theoretical computer science / Analysis

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol∗ Ran Canetti MIT and IBM TJ Watson Research Center ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-16 11:54:21
857Polynomials / Integer factorization algorithms / Public-key cryptography / Finite fields / XTR / Polynomial interpolation / Discrete Fourier transform / Polynomial / RSA / Mathematics / Abstract algebra / Mathematical analysis

Cryptanalysis of the RSA Subgroup Assumption from TCC 2005? Jean-S´ebastien Coron1 , Antoine Joux2,3 , Avradip Mandal1 , David Naccache4 , and Mehdi Tibouchi1,4 1 Universit´e du Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 02:57:04
858Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
859Non-interactive zero-knowledge proof / Mathematical proof / Zero-knowledge proof / Commitment scheme / Cryptography / Cryptographic protocols / Decision Linear assumption

Groth–Sahai proofs revisited E. Ghadafi, N.P. Smart, and B. Warinschi Dept. Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-17 10:23:34
860Proof of knowledge / Finite fields / IP / Zero-knowledge proof / Random oracle / NP / XTR / MQV / Cryptography / Cryptographic protocols / Cryptographic hash functions

An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-15 09:30:41
UPDATE