Hellman

Results: 440



#Item
341ElGamal signature scheme / Digital signature / Key distribution / Public key certificate / Pretty Good Privacy / Peer-to-peer / Certificate authority / Diffie–Hellman key exchange / Routing / Cryptography / Public-key cryptography / Key management

Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:17:54
342Public-key cryptography / Internet Relay Chat / HTTP Secure / Diffie–Hellman key exchange / Secure Remote Password protocol / Secure Shell / Cryptographic protocols / Cryptography / Secure multi-party computation

Canon-MPC, A System for Casual Non-Interactive Secure Multi-Party Computation Using Native Client ∗ Ayman Jarrous

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2014-03-04 08:27:08
343European Union competition law / European Union law / Economy of the European Union / Internal Market

EN Case No COMP/M.6324 BAIN CAPITAL / HELLMAN

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2011-08-12 04:18:21
344Key management / Cryptographic protocols / Elliptic curve cryptography / Key size / IEEE P1363 / PKCS / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Diffie–Hellman key exchange / Cryptography / Cryptography standards / Public-key cryptography

Microsoft Word - medea03-v9.doc

Add to Reading List

Source URL: vega.dii.unisi.it

Language: English - Date: 2003-09-04 12:55:08
345Key management / Electronic commerce / RSA / Digital signature / Secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / RSA numbers / Cryptography / Public-key cryptography / Cryptographic protocols

Further Simplifications in Proactive RSA Signatures Stanislaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {stasio, nitesh}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2005-03-04 00:10:28
346Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Semantic security / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik, School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {ccastell,stasio,gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 19:57:06
347Modular arithmetic / Public-key cryptography / Euclidean algorithm / Merkle–Hellman knapsack cryptosystem / Linear congruence theorem / Quadratic residue / Affine cipher / Classical cipher / Cryptography / Mathematics / Number theory

A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations" S.R. Blackburn, S. Murphyyand K.G. Patersonz Information Security Group, Royal Holloway, University of London, Surrey TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:34
348Finite fields / Cryptographic protocols / Homomorphic encryption / Diffie–Hellman problem / Strong RSA assumption / RSA / Elliptic curve cryptography / Actor model / Eurocrypt / Cryptography / Public-key cryptography / Computational hardness assumptions

Victor Shoup Curriculum Vitae Feb. 6, 2014 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2014-02-06 21:21:47
349Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
350Authentication protocol / Diffie–Hellman key exchange / Public-key cryptography / Password authentication protocol / Random oracle / Key-agreement protocol / Cryptography / Cryptographic protocols / Internet protocols

Authentication for Paranoids: Multi-Party Secret Handshakes Stanislaw Jarecki, Jihye Kim, and Gene Tsudik Computer Science Department University of California, Irvine {stasio, jihyek, gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2006-07-12 12:31:28
UPDATE