DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» XTR
XTR
Bilinear Map Cryptography from Progressively Weaker Assumptions
Circuit-Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World
Implementation and Performance Evaluation of XTR Over Wireless Network
DRAFT Special Publication 800-56A, Recommendation for Pair-Wise Key
21. the Diffie-Hellman Problem
Public-Key Cryptography
Polynomial Interpolation of the Generalized Diffie
Public-Key Cryptography
A Re-Examine on Assorted Digital Image Encryption Algorithm's
Hyperelliptic Pairings
15-853:Algorithms in the Real World Cryptography Outline Public Key
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks ?
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
(Jk-RSA) and NTRU
Cryptographic Extraction and Key Derivation: the HKDF Scheme
Password-Based Simsec Protocol
Comparative Analysis of Cryptography Library in Iot
Algorithms and Cryptographic Protocols Using Elliptic Curves
Top View
A More Compact Representation of XTR Cryptosystem∗
Encryption § Digital Signature § Anonymity Protocols § Etc
Hybrid Encryption in the Multi-User Setting
Public-Key Cryptography Before 1985 RSA Finite Fields
ON STUDY of SOME ASYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS Mr
Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography
Separating Decision Diffie–Hellman from Computational Diffie–Hellman
Verifiable Multi-Secret Sharing Schemes Based on XTR
Algebraic Generalization of Diffie–Hellman Key Exchange
Cryptanalysis of the Dragonfly Key Exchange Protocol
Efficient Arithmetic on Hyperelliptic Curves with Real Representation
A ABE, See Attribute-Based Encryption (ABE) Additive Inverse Addition and Subtraction Property, 7, 8 Inverse Addition and Subtra
Evidence That XTR Is More Secure Than Supersingular Elliptic Curve Cryptosystems
Improved Fault Analysis of Signature Schemes
ECE 646 – Fall 2015 Term Project Overview, Comparison of Open Crypto Libraries for Application Development
The XTR Public Key System
Cryptography from Pairings
XTR Cryptosystem for SMS Security
Low-Cost Standard Signatures in Wireless Sensor Networks: a Case for Reviving Pre-Computation Techniques?
Easy Decision-Diffie-Hellman Groups
Elliptic Cryptosystem
Supersingular Elliptic Curves (In Cryptography)
Public Key Cryptography in Sensor Networks—Revisited *
Authenticated ID-Based Key Exchange and Remote Log-In with Simple Token and PIN Number
Public-Key Cryptography Theory and Practice
Point Compression for the Trace Zero Subgroup Over a Small Degree Extension Field
Cryptographic Schemes Based on Elliptic Curve Pairings
Torus-Based Cryptography
Pairing Computation on Hyperelliptic Curves of Genus 2
A Survey of Public-Key Cryptosystems
An Overview of the XTR Public Key System
And Post-Quantum Diffie-Hellman from Groups, Actions, And
Obstacles to the Torsion-Subgroup Attack on the Decision Diffie-Hellman Problem
Comparison of Innovative Signature Algorithms for Wsns
On the Bit Security of Ntruencrypt
Algebraic Generalization of Diffie-Hellman Key Exchange
Recommendation for Pair-Wise Key Establishment Schemes Using
NTRU-KE: a Lattice-Based Public Key Exchange Protocol
On the Theory and Practice of Quantum-Immune Cryptography