Hellman

Results: 440



#Item
101Smoking / Entheogens / Leaves / Tobacco / Electronic cigarette / Addiction / Discourse / Ethics / Linguistics / Science

MEDIA IMAGES OF ADDICTION IN SOCIETY AREA: 1 Ownership of Addiction WP: 3 Leading Scientists: Matilda Hellman &

Add to Reading List

Source URL: www.alicerap.eu

Language: English - Date: 2012-05-08 09:07:01
102Ring theory / Finite fields / Theoretical computer science / Diffie–Hellman problem / XTR / Polynomial ring / Algorithm / Ring / Naor-Reingold Pseudorandom Function / Abstract algebra / Algebra / Mathematics

Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp , Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-30 10:17:55
103Advantage / Project Nike / ElGamal encryption / Diffie–Hellman key exchange / Ciphertext indistinguishability / Standard model / Random oracle / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Public-key cryptography / Cryptographic protocols

Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 16:38:11
104Tobacco / Behavior / Habits / Advertising / Tobacco advertising / Tobacco smoking / Electronic cigarette / Health effects of tobacco / Billboard / Human behavior / Smoking / Ethics

Reframing addictions: Media images Matilda Hellman University of Helsinki WP3/Media study: Franca Beccaria, Sara Rolando, Enrico Petrilli, Michal Bujalksi, Jacek

Add to Reading List

Source URL: www.alicerap.eu

Language: English - Date: 2013-04-30 06:38:27
105Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
106Risk management / Nuclear weapons / Emergency management / Risk / Nuclear warfare / Management / Ethics / Actuarial science

Presentation of Briefing Paper Martin Hellman Stanford Briefing paper

Add to Reading List

Source URL: globalchallenges.org

Language: English - Date: 2015-01-15 05:58:08
107Designated verifier signature / Parity of a permutation / RSA / Signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Digital signature

Microsoft Word - A new identity-based strong designated verifier signature scheme1115.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 03:09:27
108Ciphertext indistinguishability / Public-key cryptography / Internet Key Exchange / Whitfield Diffie / Index of cryptography articles / Station-to-Station protocol / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols Arnab Roy1 , Anupam Datta2 , John C. Mitchell1 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-10-07 02:05:31
109Secure communication / Internet standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / X.509 / Public-key cryptography / Key / Cryptography / Cryptographic protocols / Internet protocols

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-05-16 18:05:25
110Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
UPDATE