Provable security

Results: 54



#Item
11

Another Look at “Provable Security” Neal Koblitz Dept. of Mathematics, BoxUniv. of Washington, Seattle, WAU.S.A.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-04 15:59:05
    12Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

    - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-11-09 21:16:55
    13

    Provable post-quantum security Renato Renner Institute for Theoretical Physics

    Add to Reading List

    Source URL: pqc2010.cased.de

    Language: English - Date: 2010-06-02 01:48:25
      14

      Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-24 06:11:58
        15Cryptography / Serge Vaudenay / Provable security / Zhang Fangguo / Cryptographic primitive / Willy Susilo / Block cipher / Cryptographic hash function

        - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

        Add to Reading List

        Source URL: security-lab.jaist.ac.jp

        Language: English - Date: 2015-08-13 01:39:17
        16

        A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-02-17 19:30:26
          17Scuola superiore di Catania / Computer science / Whitfield Diffie / Provable security / Aarhus University / Nigel Smart / Cryptography / Ivan Damgård / University of Catania

          Antonio Marcedone Date of birth: Address: Gates Hall, RoomHoy Rd, Ithaca, NYCitizenship: Italian

          Add to Reading List

          Source URL: www.marcedone.it

          Language: English - Date: 2015-02-22 00:00:40
          18

          The Science of Security Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

          Add to Reading List

          Source URL: www.ibiblio.org

          Language: English - Date: 2011-11-15 16:55:16
            19

            Probable security in asymmetric cryptography Speaker: Damien VERGNAUD Provable (or reductionnist) security is a set of mathematical techniques by means of which cryptographers analyze a cryptographic system and demonstra

            Add to Reading List

            Source URL: www.jsps.go.jp

            - Date: 2008-03-13 01:49:24
              20Ciphertext indistinguishability / Public-key cryptography / Mathematical proof / Concrete security / Random oracle / RSA / Equivalence relation / Cryptography / Optimal asymmetric encryption padding / Mathematical logic

              Beyond Provable Security: Verifiable IND-CCA Security of OAEP

              Add to Reading List

              Source URL: certicrypt.gforge.inria.fr

              Language: English - Date: 2013-06-17 13:32:36
              UPDATE