Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...although this is in fact the case, <math>B</math> mistakenly believes the key is instead shared with an entity <math>E \neq A</math>. ...shares the key with Eve, while he actually shares the key with Alice. The “key share” with Alice is thus unknown to Bob. ...
    1 KB (200 words) - 16:06, 27 June 2024
  • ...simple_public_key.html |archivedate=October 7, 2011 }}</ref> is a [[public-key cryptosystem]] proposed in 1998 by [[Bram Cohen]]. ==Key generation== ...
    2 KB (275 words) - 14:10, 18 June 2024
  • ...ocols.<ref name="stallings">{{cite book|last=Stallings|first=William|title=Cryptography and Network Security Principles and Practices, Fourth Edition|year=2005|pub == Public-key protocol == ...
    3 KB (514 words) - 23:51, 30 September 2023
  • ==Key generation== Now ''N'' is the public key and ''d'' is the private key. ...
    2 KB (322 words) - 01:49, 18 June 2023
  • ...ng parties. The security of YAK is disputed (see below and the [[Talk:YAK (cryptography)|talk page]]). ...tic curve cryptography]]. Let <math>g^a</math> be Alice's long-term public key and <math>g^b</math> be Bob's. The protocol executes in '''one round''': ...
    6 KB (893 words) - 21:17, 10 February 2025
  • ...e web|url=https://newhopecrypto.org/index.shtml|title=NewHope Post-quantum key encapsulation}}</ref><ref name="cnet">{{cite web|url=https://www.cnet.com/a ...experimenting-with-post-quantum.html|title=Experimenting with Post-Quantum Cryptography|date=7 July 2016|website=security.googleblog.com|accessdate=14 November 201 ...
    4 KB (523 words) - 19:18, 13 February 2025
  • ...t=Merkle |first=Ralph |date=1979 |title=Secrecy, authentication and public key systems |url=http://www.ralphmerkle.com/papers/Thesis1979.pdf |journal=Ph.D ...by [[quantum computer]]s. The traditional [[Public-key cryptography|public key]] algorithms, such as RSA and [[ElGamal signature scheme|ElGamal]] would be ...
    8 KB (1,383 words) - 21:07, 21 February 2025
  • In cryptography, the '''anonymous veto network''' (or AV-net) is a multi-party secure compu ...style x_i \,\in_R\, \mathbb{Z}_q</math> and publishes the ephemeral public key <math>\scriptstyle g^{x_i}</math> together with a [[zero-knowledge proof]] ...
    3 KB (484 words) - 16:41, 15 July 2023
  • ...–Goldfeld protocol''', also known as a '''commutator key exchange''', is a key-exchange protocol using [[nonabelian group]]s. It was invented by Drs. Mich '''Alice's public/private information:''' ...
    5 KB (776 words) - 21:47, 21 March 2023
  • ...te residuosity assumption (DCRA)''' is a mathematical assumption used in [[cryptography]]. In particular, the assumption is used in the proof of the [[Paillier cry * P. Paillier, ''Public-Key Cryptosystems Based on Composite Degree Residuosity Classes'', Eurocrypt 19 ...
    951 bytes (123 words) - 15:06, 19 April 2023
  • ...sed cryptography|lattice-based]] [[cryptosystem]] is a broken [[Public-key cryptography|asymmetric]] cryptosystem based on [[Lattice (group)|lattices]]. There is GGH involves a ''private key'' and a ''public key''. ...
    5 KB (787 words) - 14:49, 15 October 2024
  • In [[cryptography]], the '''Niederreiter cryptosystem''' is a variation of the [[McEliece cry ===Key generation=== ...
    5 KB (789 words) - 03:49, 7 July 2023
  • ...03/PhysRevLett.67.661}}</ref>, is a [[Quantum key distribution|QKD(Quantum Key Distribution Protocol)]] developed by [[Artur Ekert]] in 1991. ...which is not vulnerable to quantum attacks in asymmetric keys([[Public-key cryptography|PPK]]). ...
    4 KB (690 words) - 12:16, 17 February 2025
  • .... They are often used in combination with [[cold boot attack]]s to extract key material from computers. ...termining specific byte patterns that must necessarily exist in the target key material and looking for these patterns. ...
    7 KB (1,210 words) - 15:20, 7 January 2025
  • ...t ''e'' is small or when partial knowledge of a prime factor of the secret key is available. ...g <math>ed \equiv 1 \pmod{(p - 1)(q - 1)}</math>; equivalently, the secret key may be given by <math>d_p \equiv d \pmod{p - 1}</math> and <math>d_q \equiv ...
    8 KB (1,377 words) - 06:54, 20 November 2024
  • ...n as '''Boneh&ndash;Lynn&ndash;Shacham'''<ref name=BLS2004/> (BLS), is a [[cryptography|cryptographic]] [[signature scheme]] which allows a user to verify that a s ...h>G_1</math>, public keys are elements of <math>G_2</math>, and the secret key is an integer in <math>[0,q-1]</math>. Working in an elliptic curve group ...
    9 KB (1,210 words) - 19:00, 27 February 2025
  • ...ts|RFC]] 6508.<ref>{{cite IETF|last=Groves|first=M.|title = Sakai-Kasahara Key Encryption (SAKKE) | rfc = 6508 |date=February 2012 | publisher = [[Interne ...user. In this way, this scheme removes the requirement for users to share public certificates for the purpose of encryption. ...
    10 KB (1,576 words) - 07:26, 31 July 2024
  • ...)|RSA cryptosystem]], [[Diffie–Hellman key exchange]] and [[elliptic curve cryptography]] are based on number theory and hence depend on commutative algebraic stru ...cols have been developed for solving various cryptographic problems like [[key exchange]], [[encryption]]-decryption, and [[authentication]]. These protoc ...
    12 KB (1,946 words) - 01:33, 29 June 2024
  • ...based on multivariate equations with the goal of achieving [[Post-quantum cryptography|quantum resistance]]. ...ber of equations. Encoding the coefficients of all these equations in the key requires considerable space, at least 200 kilobytes for a system that would ...
    10 KB (1,458 words) - 14:53, 30 December 2024
  • | derived from = [[Public-key encryption]] | key size = ...
    5 KB (648 words) - 16:12, 30 November 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)