Eprint

Results: 2085



#Item
891Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
892Oblivious transfer / Zero-knowledge proof / Proof of knowledge / Universal composability / Communications protocol / Public-key cryptography / RSA / XTR / Blind signature / Cryptography / Cryptographic protocols / Commitment scheme

Universally Composable Adaptive Oblivious Transfer Matthew Green Susan Hohenberger Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-14 17:22:59
893

            

Add to Reading List

Source URL: eprint.iacr.org

Language: Hungarian - Date: 2004-03-04 18:01:17
    894Polynomials / Multiplication algorithm / Fast Fourier transform / Root of unity / Irreducible polynomial / Mathematics / Abstract algebra / Algebra

    Compact Ring-LWE Cryptoprocessor Sujoy Sinha Roy1 , Frederik Vercauteren1 , Nele Mentens1 , Donald Donglong Chen2 and Ingrid Verbauwhede1 1 ESAT/COSIC and iMinds, KU Leuven Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-06-18 15:10:00
    895Business / Bitcoin / Bond / Security / Proof-of-work system / Order / Payment / Stock / Stock market / Economics / Terminology

    A block chain based decentralized exchange Harsh Patel Abstract. A pure peer to peer version of the exchange system would allow all parties access to the market without relying on any central orga

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-18 05:47:27
    896Finite fields / Polynomials / Euclidean algorithm / Greatest common divisor / XTR / Vehicle Identification Number / Factorization of polynomials over a finite field and irreducibility tests / Lenstra elliptic curve factorization / Mathematics / Number theory / Algebra

    Direct Division in Factor Rings Christopher Wolf∗ Department of Mathematics ESAT-COSIC

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-18 15:04:16
    897SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

    improved_analysis_of_Shamata-BC.dvi

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-04 03:59:47
    898Linux-based devices / Netbooks / Hewlett-Packard / HP EliteBook / Tablet computer / HP ePrint / HP TouchSmart / HP Mini / Computing / Technology / Computer hardware

    PSG AMS Commercial Notebook Datasheet 2013

    Add to Reading List

    Source URL: store.hp.com

    Language: English - Date: 2015-02-12 12:54:11
    899Cryptography / Ciphertext indistinguishability / Learning with errors

    Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz1? , Daniel Masny1?? , Krzysztof Pietrzak2? ? ? 1 Horst-G¨

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-28 02:59:10
    900Group theory / Algorithm / Applied mathematics / Mathematics / Elliptic curves / Analytic number theory

    Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity [Cryptology ePrint Archive, ReportBenoˆıt Chevallier-Mames1 , Mathieu Ciet2 , and Marc Joye1 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-11-12 11:22:51
    UPDATE