Search results

Jump to navigation Jump to search
Results 1 – 21 of 41
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==Pairings in cryptography== {{Main|Pairing-based cryptography}} ...
    6 KB (962 words) - 19:35, 13 March 2025
  • {{Short description|Computational hardness assumption used in elliptic curve cryptography}} ...certain [[subgroup]]s of elliptic curves which have useful properties for cryptography. Specifically, XDH implies the existence of two distinct [[Group (mathemat ...
    5 KB (622 words) - 02:40, 18 June 2024
  • ...and [[algebraic geometry]], and has also been applied in [[elliptic curve cryptography]] and [[identity based encryption]]. *[[Pairing-based cryptography]] ...
    5 KB (845 words) - 04:07, 13 December 2024
  • {{Short description|Variant of ID-based cryptography}} '''Certificateless cryptography''' is a variant of [[ID-based cryptography]] intended to prevent the [[key escrow]] problem. Ordinarily, keys are gene ...
    4 KB (623 words) - 17:20, 16 February 2025
  • | fields = [[Cryptography]] ...tographic hash functions]], [[Pairing-based cryptography]], [[Post-quantum cryptography]] ...
    9 KB (1,181 words) - 22:01, 29 November 2024
  • ...encryption''' ('''IBE'''), is an important primitive of [[identity-based cryptography]]. As such it is a type of [[public-key encryption]] in which the [[public ...ref> He was however only able to give an instantiation of [[Identity-based cryptography|identity-based signatures]]. Identity-based encryption remained an open pro ...
    16 KB (2,137 words) - 00:54, 12 April 2025
  • ...[[cyclic group]]s. It is used as the basis to prove the security of many [[cryptography|cryptographic]] protocols, most notably the [[ElGamal encryption|ElGamal]] {{Cryptography navbox | public-key}} ...
    7 KB (1,085 words) - 21:48, 16 April 2025
  • '''Hyperelliptic curve cryptography''' is similar to [[elliptic curve cryptography]] (ECC) insofar as the [[Imaginary hyperelliptic curve|Jacobian]] of a [[hy ...liptic Curve Cryptography 2007 }}</ref> The use of hyperelliptic curves in cryptography came about in 1989 from [[Neal Koblitz]]. Although introduced only 3 years ...
    11 KB (1,882 words) - 20:05, 18 June 2024
  • *[[One-time pad]], in cryptography ...
    2 KB (248 words) - 02:30, 8 June 2023
  • *[[Topics in cryptography]] | title = Cryptography and Network Security ...
    6 KB (739 words) - 05:40, 27 May 2025
  • | fields = [[Cryptography]] * [[Public-key cryptography]] ...
    11 KB (1,510 words) - 15:12, 22 September 2024
  • ...c conference|conferences]], four area conferences in specific sub-areas of cryptography, and one symposium:<ref>[https://www.iacr.org/meetings/ IACR Conferences]</ * Public Key Cryptography (PKC) ...
    31 KB (3,992 words) - 14:14, 11 November 2025
  • {{Short description|Problem in cryptography}} ...n=0018-9448 |via=IEEE|url-access=subscription }}</ref> in the context of [[cryptography]] and serves as the theoretical basis of the [[Diffie–Hellman key exchange] ...
    8 KB (1,076 words) - 14:58, 28 May 2025
  • | known_for = [[Frey curve]]<br>[[Trace zero cryptography]] ...diophantine geometry]], as well as applications to [[coding theory]] and [[cryptography]]. ...
    8 KB (991 words) - 12:36, 30 May 2025
  • | known_for = [[Frey curve]]<br>[[Trace zero cryptography]] ...diophantine geometry]], as well as applications to [[coding theory]] and [[cryptography]]. ...
    8 KB (993 words) - 09:02, 30 June 2025
  • ...=Oorschot|first2=P. van|last3=Vanstone|first3=S.|title=Handbook of Applied Cryptography|year=1997|publisher=CRC Press|isbn=0-8493-8523-7|edition=5th|url-access=reg ...irst1=Jonathan |last2=Lindell |first2=Yehuda |title=Introduction to modern cryptography |date=2021 |publisher=CRC Press Taylor & Francis Group |location=Boca Raton ...
    12 KB (1,683 words) - 16:52, 18 June 2025
  • ...rst1=Mihir | last2=Rogaway | first2=Phillip | title=Introduction to Modern Cryptography | year=2005 | url=http://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/b ...first1=Whitfield | last2=Hellman | first2=Martin | title=New directions in cryptography | year=1976 | url=https://caislab.kaist.ac.kr/lecture/2010/spring/cs548/bas ...
    6 KB (898 words) - 00:01, 8 March 2025
  • ...h a proof, the capabilities of the attacker are defined by an [[adversary (cryptography)|adversarial]] model (also referred to as attacker model): the aim of the p Outside of cryptography, the term is often used in conjunction with [[secure coding]] and [[securit ...
    18 KB (2,489 words) - 05:03, 17 April 2025
  • ...umptions are of particular importance in [[cryptography]]. A major goal in cryptography is to create [[cryptographic primitive]]s with [[provable security]]. In so ...r |title-link=International Association for Cryptologic Research#Theory of Cryptography |series=Lecture Notes in Computer Science |volume=9562 |doi-access=free|isb ...
    27 KB (3,729 words) - 17:58, 17 February 2025
  • ...ak [[cipher]]s can become very strong by increasing the number of [[round (cryptography)|rounds]], which can ward off a [[differential attack]]. The slide attack w {{cryptography navbox | block}} ...
    7 KB (1,113 words) - 08:49, 24 September 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)