Naor

Results: 103



#Item
81Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-04 13:22:38
82Finite fields / Cryptographic protocols / Diffie–Hellman key exchange / Kleptography / XTR / RSA / Key management / Discrete logarithm / Naor-Reingold Pseudorandom Function / Cryptography / Abstract algebra / Public-key cryptography

Kleptography: Using Cryptography Against Cryptography Adam Young* and

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-09-12 07:28:33
83Road transport / Car safety / ECall / Road traffic safety / Transport / Land transport / Road safety

An examination of safety impacts from promoting e-Safety Systems in Israel S. Bekhor, V. Gitelman, S. Sheffer-Chen, Y. Abramson Introduction Technion - Israel Institute of Technology, Ran Naor Road Safety Research Cente

Add to Reading List

Source URL: www.ictct.org

Language: English - Date: 2014-12-22 09:43:33
84Hash table / Sequence container / Lookup table / Trie / Memory / In-place algorithm / Extensible Storage Engine / Computing / Computer programming / Software optimization

Deterministic History-Independent Strategies for Storing Information on Write-Once Memories Tal Moran∗ Moni Naor∗†

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2009-05-01 08:47:26
85Road safety / Car safety / Intelligent transportation systems / Automobile safety / Traffic collision / Road traffic safety / ECall / Truck driver / PReVENT / Transport / Land transport / Road transport

AN EXAMINATION OF SAFETY IMPACTS FROM PROMOTIMG E-SAFETY APPLICATIONS IN ISRAEL SARIT CHEN, SHLOMO BEKHOR, VICTORIA GITELMAN Ran Naor Road Safety Research Center, Technion-Israel Institute of Technology E-mail: saritsh@t

Add to Reading List

Source URL: www.ictct.org

Language: English - Date: 2014-12-22 09:43:33
86Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
87Haifa / Technion / Ben-Gurion University of the Negev / Or Yarok / Yad Hanadiv / David Ben-Gurion / Monash University Accident Research Centre / Asia / Israel / Science and technology in Israel

Road safety research and education in Israel A report from the International Experts Advisory Committee for the Ran Naor Foundation and the Yad Hanadiv Foundation

Add to Reading List

Source URL: www.ictct.org

Language: English - Date: 2014-12-22 09:44:21
88Universal composability / Zero-knowledge proof / Communications protocol / Protocol / Proof of knowledge / Cryptographic protocols / Data / Information

POLLING WITH PHYSICAL ENVELOPES: A RIGOROUS ANALYSIS OF A HUMAN-CENTRIC PROTOCOL∗ TAL MORAN† AND MONI NAOR‡ Abstract. We propose simple, realistic protocols for polling that allow the responder to plausibly repudia

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-06-14 09:27:06
89Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
90Theoretical computer science / Network theory / Networks / Chord / Greedy algorithm / Routing / Shortest path problem / Small-world network / Koorde / Mathematics / Graph theory / Distributed data storage

Know thy Neighbor’s Neighbor: the Power of Lookahead in Small Worlds and Randomized P2P Networks∗† Gurmeet Singh Manku‡ Moni Naor§¶

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2011-11-19 02:38:54
UPDATE