Ciphertext indistinguishability

Results: 264



#Item
41Calibrating Noise to Sensitivity in Private Data Analysis Cynthia Dwork1 , Frank McSherry1 , Kobbi Nissim2 , and Adam Smith3? 1  Microsoft Research, Silicon Valley. {dwork,mcsherry}@microsoft.com

Calibrating Noise to Sensitivity in Private Data Analysis Cynthia Dwork1 , Frank McSherry1 , Kobbi Nissim2 , and Adam Smith3? 1 Microsoft Research, Silicon Valley. {dwork,mcsherry}@microsoft.com

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-07-21 20:16:56
42Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-03-17 15:01:03
43Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Add to Reading List

Source URL: www.e7n.ch

Language: English
44A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

Add to Reading List

Source URL: grsrd.uni.lu

Language: English - Date: 2013-04-09 08:10:38
45

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
46

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-16 06:52:57
47BRICS  Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security  From Known-Plaintext Security to

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security From Known-Plaintext Security to

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 09:17:54
48main_CameraReadyFormatting.dvi

main_CameraReadyFormatting.dvi

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2012-05-14 19:11:08
49An extended abstract of this paper is published in the proceedings of ASIACRYPTSignature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust∗,  Carmit Hazay†,

An extended abstract of this paper is published in the proceedings of ASIACRYPTSignature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust∗, Carmit Hazay†,

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-29 12:12:28
50CS255: Introduction to Cryptography  Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53