Selected Areas in Cryptography

Results: 7



#Item
1Payment systems / Payment / Credit card / Receipt / Cheque / Accounts payable / Mail

Selected Areas in Cryptography (SAC 2010)

Add to Reading List

Source URL: seta2012.uwaterloo.ca

Language: English - Date: 2012-05-10 10:45:24
2Cryptography / Applied mathematics / Block cipher / Stream cipher / Cryptographic hash function / Cryptanalysis / Data Encryption Standard / Joan Daemen / VEST / Cipher / Symmetric-key algorithm / Selected Areas in Cryptography

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:23
3Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions

Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 15:00:00
4Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 23:31:44
5Mathematical notation / Exponentiation / Addition chain / Precomputation / Multiplication / Exponentiation by squaring / Addition-chain exponentiation / Mathematics / Exponentials / Binary operations

S. Vaudenay, A. M. Youssef (Eds.): Selected Areas in Cryptography – SAC 2001, Springer-Verlag LNCS 2259, pp. 165–180, ISBNAlgorithms for Multi-exponentiation Bodo M¨oller Technische Universit¨

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:58
6Poly1305-AES / Block cipher / VMAC / Advanced Encryption Standard / Tiny Encryption Algorithm / CBC-MAC / ARIA / Q / Triple DES / Cryptography / Message authentication codes / CMAC

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
7Finite fields / Computational Diffie–Hellman assumption / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Diffie–Hellman key exchange / Hellman / ElGamal encryption / Whitfield Diffie / XDH assumption / Cryptography / Computational hardness assumptions / Cryptographic protocols

Workshop on Selected Areas in Cryptography[removed] – 16 august 2002, St. John’s, Newfoundland, Canada) H. Heys and K. Nyberg Eds. Springer-Verlag, LNCS 2595, pages 325–338

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2007-07-06 16:33:16
UPDATE