Ciphertext indistinguishability

Results: 264



#Item
51Efficient Secure Two-Party Protocols: Techniques and Constructions

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
52Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
53An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
54Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt†  Hoeteck Wee‡

Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt† Hoeteck Wee‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-09 09:25:45
55IACR School on Computer-Aided Cryptography

IACR School on Computer-Aided Cryptography

Add to Reading List

Source URL: www.easycrypt.info

Language: English - Date: 2015-06-01 12:29:59
56Security II: Cryptography Markus Kuhn Computer Laboratory  Lent 2012 – Part II

Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-04-25 09:16:13
57CS276 Cryptography  Spring 2006 Lecture 19: Lecturer: David Wagner

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
58CS 276: Cryptography Lecture Notes Todd Kosloff February 18, 2004 First Half Last time, we talked about definitions of security for symmetric key cryptosystems. We can use these definitions to prove that various

CS 276: Cryptography Lecture Notes Todd Kosloff February 18, 2004 First Half Last time, we talked about definitions of security for symmetric key cryptosystems. We can use these definitions to prove that various

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
59U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
60Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45