CS-Cipher

Results: 180



#Item
21Keyword cipher / Dominance order / Join / Tuple

PerK: Personalized Keyword Search in Relational Databases through Preferences Kostas Stefanidis Marina Drosou

Add to Reading List

Source URL: www.cs.uoi.gr

Language: English - Date: 2012-09-27 06:19:27
22Matching / Lattice theory / Combinatorial optimization / Lattice / Duality / Bipartite graph / Distributive lattice / 3-dimensional matching / Keyword cipher

The center stable matchings and the centers of cover graphs of distributive lattices Christine T. Cheng∗ Eric McDermid†

Add to Reading List

Source URL: www.cs.uwm.edu

Language: English - Date: 2011-04-27 11:40:36
23Cryptography / Format-preserving encryption / Feistel cipher / Cipher / Block cipher mode of operation / Data Encryption Standard / Symmetric-key algorithm / Initialization vector / RSA / Block size / IEEE P1619 / Advanced Encryption Standard

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
24Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-10-15 15:27:48
25Cryptography / Encryption / ElGamal encryption / Mix network / Ciphertext / Public-key cryptography / RSA / Cipher / Identity-based conditional proxy re-encryption / Proxy re-encryption

Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
26Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
27Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-30 10:38:30
28Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-03-17 15:01:03
29Four-square cipher / Classical cipher

THE UNIVERSITY T U C S C) N.

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2009-05-25 01:07:43
30Computer programming / Classical cipher / Index of agriculture articles

Towards Scalable Location-aware Services: Requirements and Research Issues Mohamed F. Mokbel Walid G. Aref

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39
UPDATE