DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Trapdoor function
Trapdoor function
Mihir Bellare Curriculum Vitae Contents
Stronger Security Notions for Trapdoor Functions and Applications
Part V Public-Key Cryptosystems, I. Key Exchange, Knapsack
Solving NTRU Challenges Using the New Progressive BKZ Library
How to Strengthen Ntruencrypt to Chosen-Ciphertext Security in the Standard Model
One-Time Trapdoor One-Way Functions
Practical Lattice-Based Digital Signature Schemes J
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
RSA and PUBLIC-KEY CRYPTOGRAPHY
Construction of Efficient Authentication Schemes Using Trapdoor Hash Functions
The Factoring Dead: Preparing for the Cryptopocalypse
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Section 5 Public Key Crypto Topics: RSA, ECC, Cas Administrivia
Public Key Cryptography Diffie-Hellman Key Establishment
The RSA Trapdoor Permutation
Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7
Authenticated Key Exchange and Key Encapsulation in the Standard Model
NTT Technical Review, Jan. 2008, Vol. 6, No. 1
Top View
One-Way Functions Are Necessary and Sufficient for Secure Signatures
A Generic Variant of Nist's Kas2 Key Agreement Protocol
Lecture 3 1 Trapdoor Functions
Status of Draft ANSI X9.44 Presentation
Public Key Cryptography
On the Security of HFE, Hfev- and Quartz
Lossy Trapdoor Functions and Their Applications∗
How to Sign Given Any Trapdoor Function (Extended Abstract)
Verifiable Multi-Secret Sharing Schemes Based on XTR
RSA the Most Commonly Used Public-Key Cryptosystem Is RSA
Short Signatures from Homomorphic Trapdoor Functions
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
Lecture 1: Introduction of Cryptography 1 One Way Trapdoor
Public-Key Cryptography One-Way, Trapdoor One-Way, Knapsack
Ntruencrypt and NTRUMLS
How to Watermark Cryptographic Functions
Many-To-One Trapdoor Functions and Their Relation to Public-Key Cryptosystems
The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem with Other Asymmetrical Cryptosystems
How to Sign Given Any Trapdoor Permutation
Lecture 14 - Public Key Cryptography
One Way Functions and Public Key Cryptography
Public Key Cryptography Based on Semigroup Actions
New Approach for CCA2-Secure Post-Quantum Cryptosystem Using Knapsack Problem
Trapdoor Hash Functions and Their Applications
On the Trace Based Public Key Cryptosystems Over Finite Fields
Public Key Cryptography 1 Trapdoor Problems Diffie-Hellman Key
Recovering NTRU Secret Key from Inversion Oracles
VSH, an Efficient and Provable Collision-Resistant Hash Function
Public Key Cryptography
Lecture 9, Trapdoor Permutations: RSA and Digital Signatures 1
Public Key Tools
Compressing Elements in Discrete Logarithm Cryptography
New Password Authenticated Key Exchange Based on the Ring Learning with Errors
A Method of Weil Sum in Multivariate Quadratic Cryptosystem
Efficient Certificateless One-Pass Key Agreement Protocols Yasmine Abouelseoud
A Survey of Public-Key Cryptosystems
Many-To-One Trapdoor Functions and Their Relation to Public-Key Cryptosystems
Authenticated Key Exchange and Key Encapsulation Without Random Oracles
Algebraic Methods for Constructing One-Way Trapdoor Functions
A Recursive and Parallelized Dynamic Programming Implementation of Hard Merkle-Hellman Knapsack System for Public Key Cryptography
Chosen Ciphertext Security from Injective Trapdoor Functions
Proquest Dissertations
Generic Attacks and the Security of Quartz ,
Comments on the Proposed FIPS for Key Exchange and Agreement: (All of the Following Were Received by E-Mail
Lattice-Based Cybersecurity in the Quantum Era
Certifying RSA
A Classification of Lattice-Based Trapdoor Functions
How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions
Identity Based (Lossy) Trapdoor Functions and Applications
Part V Public-Key Cryptosystems, I. Key Exchange, Knapsack