Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,213,209 papers from all fields of science
Search
Sign In
Create Free Account
Outline of cryptography
Known as:
Topics in Cryptography
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACE Encrypt
Authentication
Birthday attack
CAST-256
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
D. Berend
,
Dor Bitan
,
S. Dolev
IACR Cryptology ePrint Archive
2019
Corpus ID: 204772097
One of the most interesting research topics in cryptography is nding e cient homomorphic encryption schemes, preferably…
Expand
2017
2017
Statistically Secure One Multiplication and Additions of Secret Shares ( Preliminary version )
D. Berend
,
Dor Bitan
,
S. Dolev
2017
Corpus ID: 38757355
One of the most interesting research topics in cryptography is finding schemes for an efficient fully-homomorphic encryption (FHE…
Expand
2014
2014
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions
Kazuki Yoneyama
,
Goichiro Hanaoka
Provable Security
2014
Corpus ID: 45922426
Achieving shorter ciphertext length under weaker assumptions in chosen-ciphertext (CCA) secure public-key encryption (PKE) is one…
Expand
2014
2014
Additional Topics in Cryptography
J. Hoffstein
,
J. Pipher
,
J. Silverman
2014
Corpus ID: 60839102
The emphasis of this book has been on the mathematical underpinnings of public key cryptography. We have developed most of the…
Expand
2005
2005
Cryptosystems Based on Elliptic Curve Pairing
E. Okamoto
,
T. Okamoto
Modeling Decisions for Artificial Intelligence
2005
Corpus ID: 43162387
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy…
Expand
2005
2005
Advanced Topics in Cryptography (PDF)
unknoun unknoun
2005
Corpus ID: 63054733
2004
2004
Cmsc 858k — Advanced Topics in Cryptography 2 Hybrid Encryption
Jonathan Katz Scribes
,
C. Koo
,
Nikolai Yakovenko
,
Jeffrey Blank
2004
Corpus ID: 407235
The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption…
Expand
2004
2004
Cmsc 858k — Advanced Topics in Cryptography 2 Zero-knowledge (interactive) Proof Systems
Jonathan Katz Scribes
,
C. Koo
,
Nikolai Yakovenko
,
Jeffrey Blank
2004
Corpus ID: 236499823
In the NIZK proof systems we have seen, we have assumed that the prover and verifier share a common random string (CRS). Although…
Expand
2004
2004
Cmsc 858k — Advanced Topics in Cryptography Lecture 1
Jonathan Katz
,
S. Katz
2004
Corpus ID: 8474709
We give two definitions of trapdoor permutations. The first is completely formal, and maps well onto the (conjectured) trapdoor…
Expand
2004
2004
Cmsc 858k — Advanced Topics in Cryptography
A. Cárdenas
,
Nicholas Sze
,
Yinian Mao
,
Kavitha Swaminathan
2004
Corpus ID: 260637989
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE