Provable security

Results: 54



#Item
31Mathematics / Mathematical proof / Provable / Adversary / Science / Cryptography / Provable security / Knowledge

Another Look at Provable Security Alfred Menezes (joint work with Sanjit Chatterjee, Neal Koblitz, Palash Sarkar) EUROCRYPT 2012 –1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 14:09:49
32Mathematics / Number theory / Public-key cryptography / Symbol / RSA

Almost uniform density of power residues and the provable security of ESIGN Tatsuaki Okamoto1 and Jacques Stern2 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
33Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
34Cryptographic protocols / Internet protocols / Internet standards / Domain Name System Security Extensions / Public key certificate / X.509 / HTTP Secure / Cryptography / Public-key cryptography / Key management

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
35Formal sciences / Silvio Micali / Shafi Goldwasser / Charles Rackoff / Gödel Prize / Semantic security / Interactive proof system / ACM SIGACT / Provable security / Cryptography / Women in technology / Theoretical computer science

acm Association for Computing Machinery Advancing Computing as a Science & Profession Contact: Virginia Gold

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2013-05-21 15:34:04
36Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
37Pseudorandomness / Randomness / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Random number generation / Random seed / Random permutation / One-way function / Cryptography / Theoretical computer science / Applied mathematics

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
38Pseudorandom generator / Malleability / Commitment scheme / Semantic security / Provable security / Pseudorandom function family / Secure multi-party computation / Pseudorandom number generator / Cramer–Shoup cryptosystem / Cryptography / Random oracle / One-way function

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
39Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
40Cryptography / Provable security

Searchable Symmetric Encryption Seny Kamara Advanced Topics in Network Security Spring 2006

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:21:13
UPDATE