Eprint

Results: 2085



#Item
931Cryptographic protocols / Complexity classes / Zero-knowledge proof / Interactive proof system / Commitment scheme / NP / IP / Soundness / Entropy / Theoretical computer science / Cryptography / Applied mathematics

Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model∗ Andr´e Chailloux† Dragos Florin Ciocan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 07:18:22
932

     ! #" $

Add to Reading List

Source URL: eprint.iacr.org

Language: Vietnamese - Date: 2004-12-17 02:06:07
    933Post-quantum cryptography / Finite fields / Hidden Field Equations / Affine geometry / Affine transformation / Parity of a permutation / Abstract algebra / Geometry / Mathematics

    Equivalent Keys in HFE, C∗ , and variations Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven.ac.be or chris@

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-08-09 08:01:38
    934Secure multi-party computation / Homomorphic encryption / Paillier cryptosystem / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

    Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-06-03 06:46:06
    935MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

    Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-03-08 12:38:58
    936Authentication / Biometrics / Man-in-the-middle attack / Security / Cryptography / Password

    Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu? , Shaoyuan Zhang, and Shijie Qie Department of Computer Science, Jinan University, Guangzhou, Guangdong, China

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-13 05:22:49
    937Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

    1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-06 19:52:41
    938Hidden Field Equations / Unbalanced Oil and Vinegar / Affine transformation / Quadratic polynomial / Vector space / Polynomial / Multivariate cryptography / Algebraic geometry / Algebra / Mathematics / Post-quantum cryptography

    Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-01-28 03:37:27
    939Cryptography / Password / One-time password / Authentication / IPAQ / S/KEY / Bluetooth / Security / Mobile computers / Technology

    Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun Department of Computer Science University of California, Irvine {goodrich,ms

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-06-28 12:55:55
    940Public-key cryptography / Encryption / Digital signature / One-time pad / Key / Probabilistic encryption / Semantic security / Cryptography / Cipher / Signcryption

    Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-28 01:59:26
    UPDATE