<--- Back to Details
First PageDocument Content
Mahoning County /  Ohio / Cryptography / Password / Data security / Network security / Information security / Computer security / Youngstown State University / Malware / Security / Crime prevention / National security
Mahoning County
Ohio
Cryptography
Password
Data security
Network security
Information security
Computer security
Youngstown State University
Malware
Security
Crime prevention
National security

YSU Information Security Policy

Add to Reading List

Source URL: www.ysu.edu

Download Document from Source Website

File Size: 955,54 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Cryptography / Computational complexity theory / Theory of computation / Randomized algorithms / Complexity classes / Zero-knowledge proof / Interactive proof system / Quantum complexity theory / NP / IP / Soundness / Computational indistinguishability

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 2: Interactive Proofs 1

DocID: 1xVMd - View Document

Cryptography / Proof theory / Computational complexity theory / Zero-knowledge proof / Complexity classes / Soundness / IP / Zero knowledge / Interactive proof system / PSPACE / Mathematical proof / Proof of knowledge

The Art of Cryptography Zero Knowledge Proofs Abhiram Kothapalli Two Balls and the Color-Blind Friend

DocID: 1xVLd - View Document

Cryptography / Multivariate cryptography / Post-quantum cryptography / Algebra / Polynomials / Unbalanced Oil and Vinegar / Hidden Field Equations / Algebraic equation / QUAD / Variable / Equation / Finite field

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

DocID: 1xVDQ - View Document