Ciphertext

Results: 697



#Item
401B-tree / Cloud computing / Cloud storage / Secret sharing / Computer security / Computing / Security / Computer network security

1 Fuzzy Authorization for Cloud Storage Shasha Zhu and Guang Gong, Fellow, IEEE Abstract By leveraging and modifying Ciphertext-Policy Attribute Based Encryption (CP-ABE) and OAuth, we propose

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-25 12:24:57
402Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
403Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare

Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 04:34:57
404ID-based encryption / Cipher / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Ciphertext indistinguishability / RSA

Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-12 08:24:27
405Data management / Relational database / Mediation / ANts P2P / Homomorphic encryption / Ciphertext / Cryptography / Public-key cryptography / Data integration

Secure Mediation of Join Queries by Processing Ciphertexts Joachim Biskup, Christian Tsatedem∗ and Lena Wiese Universit¨at Dortmund Fachbereich Informatik[removed]Dortmund Germany

Add to Reading List

Source URL: wiese.free.fr

Language: English - Date: 2009-06-22 13:18:15
406Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Advantage / Cryptography / Public-key cryptography / Signcryption

Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-28 03:00:32
407RSA / Ciphertext / Cipher / Modular exponentiation / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Hardware RSA Accelerator Group 3: Ariel Anders, Timur Balbekov, Neil Forrester May 15, 2013 Contents

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-11-21 16:49:49
408McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
409Transport Layer Security / Chosen-plaintext attack / HTTP Secure / Ciphertext / Block cipher modes of operation / Authenticated encryption / Password / Probabilistic encryption / Known-plaintext attack / Cryptography / Security / Initialization vector

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
410Ciphertext indistinguishability / Voronoi diagram / Chosen-plaintext attack / Cryptography / Homomorphic encryption / RSA

Secure Nearest Neighbor Revisited Bin Yao1 , Feifei Li2 , Xiaokui Xiao3 1 Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2013-07-08 15:39:55
UPDATE