Search

Your search keyword '"DATA encryption"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic computer communication networks Remove constraint Topic: computer communication networks Journal advances in cryptology - eurocrypt'98 Remove constraint Journal: advances in cryptology - eurocrypt'98
44 results on '"DATA encryption"'

Search Results

1. Fast batch verification for modular exponentiation and digital signatures.

2. How to improve an exponentiation black-box.

3. Optimistic fair exchange of digital signatures.

4. Secure and efficient metering.

5. Easy come — Easy go divisible cash.

6. Security of an identity-based cryptosystem and the related reductions.

7. Specialized integer factorization.

8. New results on multi-receiver authentication codes.

9. Combinatorial bounds for broadcast encryption.

10. Secret sharing schemes with bipartite access structure.

11. Heuristic design of cryptographically strong balanced Boolean functions.

12. Highly nonlinear balanced Boolean functions with a good correlation-immunity.

13. On the propagation criterion of degree l and order k.

14. A practical mix.

15. Universally verifiable mix-net with verification work independent of the number of mix-servers.

16. Security analysis of a practical "on the fly" authentication and signature generation.

17. Generic constructions for secure and efficient confirmer signature schemes.

18. Strengthened security for blind signatures.

19. Quorum-based secure multi-party computation.

20. On the foundations of oblivious transfer.

21. Secure communication in minimal connectivity models.

22. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?

23. Towards a better understanding of one-wayness: Facing linear permutations.

24. A new public-key cryptosystem as secure as factoring.

25. A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption.

26. The chain & sum primitive and its applications to MACs and stream ciphers.

27. Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible.

28. A formal treatment of remotely keyed encryption.

29. Speeding up discrete log and factoring based schemes via precomputations.

30. Visual cryptanalysis.

31. Computing discrete logarithms with quadratic number rings.

32. Improved algorithms for isomorphisms of polynomials.

33. On finding small solutions of modular multivariate polynomial equations.

34. Optimum traitor tracing and asymmetric schemes.

35. Divertible protocols and atomic proxy cryptography.

36. Differential-linear weak key classes of IDEA.

37. Cryptanalysis of the ANSI X9.52 CBCM mode.

38. Lower bounds on generic algorithms in groups.

39. Improved cryptanalysis of RC5.

40. Breaking RSA may not be equivalent to factoring.

41. Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n.

42. A practical and provably secure scheme for publicly verifiable secret sharing and its applications.

43. Auto-recoverable auto-certifiable cryptosystems.

44. Securing threshold cryptosystems against chosen ciphertext attack.

Catalog

Books, media, physical & digital resources