Group key

Results: 3202



#Item
791Group signature / Ciphertext indistinguishability / BLS / Public-key cryptography / RSA / Model theory / Cryptography / Digital signature / Ring signature

Pseudorandom Signatures? Nils Fleischhacker1 , Felix G¨ unther2 , Franziskus Kiefer3 , Mark Manulis3 , and Bertram Poettering4 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-04 04:14:01
792Software / Cyberwarfare / Attribute grammar / Attrib / Group signature / Digital signature / Cryptography / Public-key cryptography / Computing

Expiration and Revocation of Keys for Attribute-based Signatures ⋆ Stephen R. Tate1 and Roopa Vishwanathan2 1 Department of Computer Science, UNC Greensboro, Greensboro, NC 27402

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-01 11:41:31
793Blind signature / Group signature / ElGamal encryption / RSA / Paillier cryptosystem / XTR / Diffie–Hellman problem / Homomorphic encryption / Commitment scheme / Cryptography / Public-key cryptography / Digital signature

Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-05-20 02:15:48
794Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
795Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
796Electronic commerce / Digital signature / Public key certificate / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Key management

A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 276–285, S. De Capitani di Vimercati and P. Syverson eds., ACM Press, 2007. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-21 16:37:42
797Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
798Technology / Electronics / Joint Test Action Group / Test engineer / Boundary scan / Manufacturing / Electronics manufacturing / Software testing

www.xjtag.com XJRunner Key Benefits Overview

Add to Reading List

Source URL: www.xjtag.com

Language: English - Date: 2014-02-14 12:04:51
799Manufacturing / Electronics / Copy protection / FlexNet Publisher / Technology / Joint Test Action Group / Floating licensing / Boundary scan / Flexera Software / Software licenses / System administration / Electronics manufacturing

XJTAG Network Licensing XJTAG Boundary Scan Tools IEEE 1149.x Key Benefits •

Add to Reading List

Source URL: www.xjtag.com

Language: English - Date: 2013-05-20 07:52:47
800Trusted Computing / Trusted Platform Module / Digital signature / Group signature / RSA / Disk encryption / Public key certificate / Cryptography / Public-key cryptography / Direct Anonymous Attestation

On the Design and Implementation of an Efficient DAA Scheme ? Liqun Chen1 , Dan Page2 , and Nigel P. Smart2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 08:44:26
UPDATE