Cryptography Research

Results: 540



#Item
31Cryptography / Public-key cryptography / Homomorphic encryption / Secure multi-party computation / Cryptographic protocol / Paillier cryptosystem / Privacy / Digital signature / Internet privacy / Zero-knowledge proof / Encryption / Cloud computing security

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
32Wireless networking / Medicine / Cryptography / Health care / Body area network / Wireless sensor network / Sensor node / Biosensor / Wireless ad hoc network / Monitoring / Cryptographic hash function / Wireless network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-26 01:10:03
33Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
34Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
35Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-05 03:04:49
36Cryptography / Cypherpunks / University of Waterloo / Centre for Applied Cryptographic Research / Ian Goldberg / Private information retrieval / Nikita Borisov / David Cheriton / Institute of Electrical and Electronics Engineers / Association for Computing Machinery

Ryan Henry School of Informatics and Computing Indiana University Bloomington 107 S. Indiana Avenue Bloomington, IN, USAOffice:

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:32
37Formal sciences / Security / Cryptography / Cyberwarfare / Analysis / Critical thinking / Thought / Mathematics / Simulation / Computer security

NRL BAA Announcement # MATHEMATICAL FOUNDATIONS OF HIGH ASSURANCE COMPUTING The Formal Methods Section (Codeof the Naval Research Laboratory’s Center

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
38Cryptography / Emerging technologies / Data security / Public key infrastructure / Public-key cryptography / Internet privacy / Communications protocol / Smart grid / Privacy / Key management / Data Encryption Standard

Fault-Tolerant Privacy-Preserving Statistics Marek Jawurek and Florian Kerschbaum SAP Research Karlsruhe, Germany {marek.jawurek|florian.kerschbaum}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-07-15 10:28:51
39Mathematics / Cryptography / Geometry / Lattice points / Linear algebra / Operations research / Analytic geometry / Lattice / Integer programming / NP / Lattice problem / Ehrhart polynomial

Math 583D, Spring 2016 MWF 1:30-2:20 Integer Optimization and Lattices Thomas Rothvoss Content

Add to Reading List

Source URL: www.math.washington.edu

Language: English - Date: 2015-06-18 14:37:10
40Theoretical computer science / Quantum cryptography / Information theory / Quantum computing / Doctorate / Theory of computation / Knowledge

Postdoctoral Fellowship in QUANTUM COMPUTING APPLIED RESEARCH LABORATORIES The University of Texas at Austin The Signal and Information Sciences Laboratory (SISL) of the Applied Research Laboratories,

Add to Reading List

Source URL: wwwext.arlut.utexas.edu

Language: English - Date: 2016-08-01 17:09:23
UPDATE