Index of cryptography articles

Results: 178



#Item
41Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
42Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2015-02-03 21:03:02
43A Certified E-Mail Protocol Bruce Schneier Counterpane Systems   James Riordan

A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
44A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005  Abstract

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
45Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 09:17:42
46Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
47Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de  Abstract. In this note we discuss some observation of the SHA-3 candida

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
48A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw

A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-04 01:29:08
49COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1  Bauhaus-University Weimar, Germany

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
50Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-11 13:21:29