Hellman

Results: 440



#Item
401Public-key cryptography / Publicly Verifiable Secret Sharing / Finite fields / Verifiable secret sharing / Secret sharing / ElGamal encryption / Diffie–Hellman key exchange / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Cryptography / Cryptographic protocols / Computational hardness assumptions

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09
402Diffie–Hellman problem / Group signature / Digital signature / ID-based encryption / Weil pairing / Pairing / RSA / Diffie–Hellman key exchange / Public-key cryptography / Cryptography / BLS / Pairing-based cryptography

Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 04:23:16
403Private equity secondary market / Alternative investment management companies / Citigroup / Investment banks / AlpInvest Partners / CVC Capital Partners / EQT Partners / Court Square Capital Partners / Apax Partners / Investment / Financial economics / Private equity

TPG Goldman Sachs Principal Investment Area The Carlyle Group Kohlberg Kravis Roberts The Blackstone Group Apollo Global Management Bain Capital CVC Capital Partners First Reserve Corporation Hellman & Friedman Apax Partners General Atlantic Warburg Pincus Cerberus Capital

Add to Reading List

Source URL: www.peimedia.com

Language: English - Date: 2011-04-28 05:53:22
404Cryptographic protocols / Diffie–Hellman key exchange / Key generation / Digital signature / RSA / Key / X.509 / Cipher / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Public Key Cryptography - Applications Algorithms and Mathematical Explanations Public Key Cryptography

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2007-06-12 10:38:53
405Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
406Finite fields / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Hellman / ElGamal encryption / Whitfield Diffie / XDH assumption / Cryptography / Computational hardness assumptions / Cryptographic protocols

Workshop on Selected Areas in Cryptography[removed] – 16 august 2002, St. John’s, Newfoundland, Canada) H. Heys and K. Nyberg Eds. Springer-Verlag, LNCS 2595, pages 325–338

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2007-07-06 16:33:16
407Finite fields / Logarithms / Computational hardness assumptions / Group theory / XTR / Discrete logarithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm records / Abstract algebra / Mathematics / Cryptography

Discrete logarithms in finite fields and their cryptographic significance A. M. Odlyzko AT&T Bell Laboratories

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1998-04-13 22:10:57
408ID-based encryption / ID-based cryptography / Certificate-based encryption / Digital signature / Key / Diffie–Hellman key exchange / Public key infrastructure / Certificateless cryptography / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
409Key management / Elliptic curve cryptography / IEEE P1363 / MQV / Integrated Encryption Scheme / Elliptic curve Diffie–Hellman / SECG / Digital signature / Key size / Cryptography / Cryptography standards / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-04-04 11:37:53
410Key management / Elliptic curve cryptography / Group theory / MQV / Integrated Encryption Scheme / Elliptic curve / Key size / Elliptic Curve DSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Finite fields

PDF Document

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-04-04 11:37:54
UPDATE