Back to Results
First PageMeta Content
Strong RSA assumption / Full Domain Hash / RSA / Rabin signature algorithm / Group signature / Cryptography / Public-key cryptography / Digital signature


Document Date: 2012-05-22 17:51:17


Open Document

File Size: 416,83 KB

Share Result on Facebook

City

KFC / Factorization / Seoul / Cambridge / /

Company

Oracle / SRI International Computer Science Laboratory / /

Country

United States / Korea / /

Currency

USD / /

/

Facility

National Institute of Standards and Technology / FIPS PUB / Massachusetts Institute of Technology / /

IndustryTerm

setup algorithm / generic factoring algorithms / acceptance algorithm / verification algorithm / Sign algorithm / polynomial-time algorithm / classical key generation algorithm / validation algorithm / deterministic polynomialtime algorithm / online transactions / deterministic polynomial-time algorithm / probabilistic algorithms / legislative infrastructure / Online Judges Alternatively / computing / security protocols / e-th / polynomialtime algorithm / /

Organization

Massachusetts Institute of Technology / EPFL Ecole Polytechnique Fédérale / National Institute of Standards and Technology / National Competence Center / US Federal Reserve / European Commission / TTP / /

Person

Markulf Kohlweiss / Avradip Mandal / Willy Susilo / Martin Hellman / Silvio Micali / Katja Schmidt-Samoa / Ivan Damgård / Ron Rivest / Josh Cohen Benaloh / Ronald L. Rivest / Niko Bari / Antoine Joux / Eugène van Heijst / Anna Lysyanskaya / Arjen K. Lenstra / Phillip Rogaway / Whitfield Diffie / Torben P. Pedersen / Jan Camenisch / Claudio Soriente / Jean-Sébastien Coron / Eugène van Heyst / Robert Silverman / Josef Pieprzyk / Michael Waidner / Mihir Bellare / Jens Groth / Eric R. Verheul / Reihaneh Safavi-Naini / Thomas Baignères / Georg Frobenius / Shafi Goldwasser / Michael O. Rabin / Leslie Lamport / David Naccache / Matthieu Finiasz / Jacques Stern / Birgit Pfitzmann / Mehdi Tibouchi / Atefeh Mashatan / /

Position

adaptive chosen message attack model / candidate for our PRF / malicious judge / General / judge / /

ProvinceOrState

Saskatchewan / Massachusetts / /

PublishedMedium

Cryptology ePrint Archive / IEEE Transactions on Information Theory / Lecture Notes in Computer Science / /

Technology

LAN / classical key generation algorithm / acceptance algorithm / probabilistic algorithms / generic factoring algorithms / setup algorithm / block cipher / corresponding validation algorithm / private key / security protocols / Accept algorithm / secret key / polynomialtime algorithm / Generic PPT algorithms / deterministic polynomial-time algorithm / validation algorithm / encryption / cryptography / Validate algorithm / KeyGen algorithm / PPT protocol / PPT algorithm / following five algorithms / deterministic polynomialtime algorithm / public key / signing algorithm / Sign algorithm / polynomial-time algorithm / verification algorithm / Digital Signature / factoring algorithms / four algorithms / five algorithms / extended Euclidean algorithm / /

URL

http /

SocialTag