Back to Results
First PageMeta Content
Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management


Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface
Add to Reading List

Document Date: 2013-03-20 04:32:08


Open Document

File Size: 40,33 KB

Share Result on Facebook

Company

Fiat / /

Country

United States / /

IndustryTerm

server-based protocols / step algorithm / rho algorithm / divisor algorithms / public-key systems / transport protocols / related key agreement protocols / gcd algorithm / establishment protocols / rho factoring algorithm / identification protocols / Internet standards / identification protocol / exponentiation algorithms / lattice basis reduction algorithm / zero-knowledge identification protocols / number systems / /

NaturalFeature

Other stream / /

OperatingSystem

UNIX / L3 / /

Organization

U.S. government / /

Position

General / /

PublishedMedium

Journal of Cryptology / /

Technology

8.5 McEliece public-key encryption / encryption / 4.4 Schnorr identification protocol / 6.2 Baby-step giant-step algorithm / zero-knowledge identification protocols / identification protocols / 8.3 Rabin public-key encryption / Cryptography / rho factoring algorithm / related key agreement protocols / 5.3 Hybrid key transport protocols / 7.3 Plaintext-aware encryption / 6.5 Index-calculus algorithm / 1 factoring algorithm / 4.3 GQ identification protocol / 8.6 Knapsack public-key encryption / 1.5 Symmetric-key encryption / 2.3 RSA encryption / server-based protocols / 8.4 ElGamal public-key encryption / PK encryption / public-key encryption / 3.4 Randomized algorithms / UNIX / 5.1 Key transport using PK encryption / 5.2 Protocols combining PK encryption / Q-matrix algorithm / 8 Public-Key Encryption / lattice basis reduction algorithm / 4.2 DES algorithm / 4.1 Binary gcd algorithm / key establishment protocols / 8.2 RSA public-key encryption / 6.1 Merkle-Hellman knapsack encryption / 6.3 Fixed-base exponentiation algorithms / identification protocol / 8.7 Probabilistic public-key encryption / 6.4 Pohlig-Hellman algorithm / digital signature / 4.2 Generalized ElGamal encryption / rho algorithm / reversible public-key encryption / 4.2 Algorithms / divisor algorithms / 4.4 Algorithms / 8.1 Public-key encryption / gcd algorithm / 6.2 Chor-Rivest knapsack encryption / 1.10 Protocols / 4.1 Basic ElGamal encryption / 2.3 Berlekamp-Massey algorithm / /

SocialTag