Trapdoor function

Results: 22



#Item
11LOSSY Identity-based (Lossy) Trapdoor Functions and Applications  Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-21 02:35:56
12How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions Craig Gentry∗ Stanford University [removed]

How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions Craig Gentry∗ Stanford University [removed]

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:32
13Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1  2

Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:05:49
14J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research  Trapdoor Hard-to-Invert Group

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
15LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
16ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:35:28
17A Compact Signature Scheme with Ideal Lattice (Extended Abstract) Keita Xagawa ∗ Keisuke Tanaka ∗

A Compact Signature Scheme with Ideal Lattice (Extended Abstract) Keita Xagawa ∗ Keisuke Tanaka ∗

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04
18Hierarchical Identity-Based Chameleon Hash and Its Applications Feng Bao1 , Robert H. Deng2 , Xuhua Ding2 , Junzuo Lai2⋆ , and Yunlei Zhao3 1  Institute for Infocomm Research, Singapore

Hierarchical Identity-Based Chameleon Hash and Its Applications Feng Bao1 , Robert H. Deng2 , Xuhua Ding2 , Junzuo Lai2⋆ , and Yunlei Zhao3 1 Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2011-06-01 03:00:45
19

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-04-04 07:06:39