One-way function

Results: 187



#Item
61On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1  Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 12:09:46
62New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2001-12-26 10:46:32
63Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗  Ilan Komargodski†

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 16:10:17
64A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
65MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
66Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-27 12:23:14
67An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
68Analysis of variance / Means / Summary statistics / Weighted mean / Weight function / Gender / One-way ANOVA / Statistics / Mathematical analysis / Statistical tests

Weighted and Unweighted Means ANOVA Please read my document Weighted Means and Unweighted Means One-Way ANOVA before continuing on with this document. As explained there, the distinction between the weighted means ANOVA

Add to Reading List

Source URL: core.ecu.edu

Language: English - Date: 2013-03-05 21:15:10
69CS255: Cryptography and Computer Security  Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
70CS255: Cryptography and Computer Security  Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35