Hellman

Results: 440



#Item
391Electronic commerce / Diffie–Hellman key exchange / RSA / XTR / Digital signature / Cipher / Three-pass protocol / SPEKE / Cryptography / Public-key cryptography / Cryptographic protocols

The history of Non-Secret Encryption y J H Ellis

Add to Reading List

Source URL: web.archive.org

Language: English
392Public-key cryptography / Dynamic programming / Cryptography / Combinatorial optimization / Mathematical optimization / Merkle–Hellman knapsack cryptosystem / Knapsack problem / P versus NP problem / Subset sum problem / Theoretical computer science / Computational complexity theory / Applied mathematics

The Rise and Fall of Knapsack Cryptosystems A. M. Odlyzko AT&T Bell Laboratories

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1998-04-13 22:11:38
393Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-03-27 10:39:45
394Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2009-08-26 20:14:40
395Merkle–Hellman knapsack cryptosystem / Knapsack problem / Rabin cryptosystem / Cryptography / Public-key cryptography / Lenstra–Lenstra–Lovász lattice basis reduction algorithm

  Kobe University Repository : Kernel

Add to Reading List

Source URL: www.lib.kobe-u.ac.jp

Language: English
396Off-the-Record Messaging / Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Secure communication / Man-in-the-middle attack / Secure Shell / MQV / Internet Key Exchange / Cryptographic protocols / Cryptography / Deniable authentication

Secure Off-the-Record Messaging Mario Di Raimondo

Add to Reading List

Source URL: www.dmi.unict.it

Language: English - Date: 2005-09-03 05:31:59
397Public-key cryptography / Diffie–Hellman key exchange / ElGamal encryption / Diffie–Hellman problem / Polynomial / RSA / Prime number / XTR / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Finite fields

In Advances in Cryptology—Asiacrypt’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]Doing More with Fewer Bits

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2000-02-21 14:17:00
398Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
399Public-key cryptography / Finite fields / XTR / Knapsack problem / Merkle–Hellman knapsack cryptosystem / Vector space / Lattice problem / NTRUEncrypt / Three-pass protocol / Mathematics / Algebra / Cryptography

A knapsack-type public key cryptosystem based on arithmetic in finite fields - Information Theory, IEEE Transactions on

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:23:31
400Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2004-10-22 12:01:39
UPDATE