Random oracle

Results: 199



#Item
91Key management / Electronic commerce / Bitcoin / Digital signature / Consensus / Blind signature / Don Mills Middle School / Random oracle / Key / Cryptography / Public-key cryptography / Financial cryptography

On Stake and Consensus Andrew Poelstrafe81626

Add to Reading List

Source URL: download.wpsoftware.net

Language: English - Date: 2015-03-22 21:54:43
92Advantage / Adversary model / Diffie–Hellman problem / Random oracle / Cryptography / Cryptographic protocols / Cryptographic hash functions

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiaotong University, 800 Dongchuan Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 03:18:55
93Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
94Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
95Communications protocol / XTR / Transmission Control Protocol / Diffie–Hellman key exchange / Digital signature / Random oracle / Oracle machine / IP / E0 / Cryptography / Cryptographic protocols / Oblivious transfer

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
96Digital signature / Commitment scheme / Random oracle / XTR / Public-key cryptography / BLS / Cryptography / Blind signature / Group signature

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-20 15:10:08
97Customer experience management / Electronic commerce / ECRM / Maximizer Software / Customer relationship management / Contact manager / Top-of-mind awareness / Sales force management system / Oracle CRM / Marketing / Business / Information technology management

GETTING AN EDGE by Pamela Mills-Senn Click into Better Customer Management CRM puts an end to lost leads, loose ends and dropped details. umbling voicemails. Random emails. Dropped followups. Botched connections.

Add to Reading List

Source URL: www.alloy-software.com

Language: English - Date: 2008-08-28 23:23:12
98Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Add to Reading List

Source URL: www.bom.gov.au

Language: English - Date: 2014-12-03 18:01:45
99Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
100ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
UPDATE