Cryptology ePrint Archive: Categories and Suggested Keywords
Users are encouraged to choose a category and keywords from the following list
for easier classification of the archive. However, other keywords may be used
as well.
Categories
- foundations
- secret-key cryptography
- public-key cryptography
- cryptographic protocols
- implementation
- applications
Keywords
- AES
- anonymity
- applications
- authentication codes
- bit commitment
- block ciphers
- boolean functions
- broadcast
- combinatorial cryptography
- complexity theory
- cryptanalysis
- DES
- digital signatures
- discrete logarithm problem
- distributed cryptography
- election schemes
- electronic commerce and payment
- elliptic curve cryptosystem
- factoring
- fair exchange
- fingerprinting
- foundations
- group signatures
- hash functions
- identification protocols
- implementation
- information hiding
- information theory
- key escrow
- key management
- lattice techniques
- linear complexity
- linear cryptanalysis
- message authentication codes
- multicast
- number theory
- oblivious transfer
- one-way functions
- primality testing
- pseudo-randomness
- public-key cryptography
- quantum cryptography
- RSA
- secret sharing
- secret-key cryptography
- smart cards
- stream ciphers
- threshold cryptography
- traitor tracing
- watermarking
- zero knowledge
[ Cryptology ePrint archive ]