Cryptosystem

Results: 355



#Item
151PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-04-25 03:42:22
152Peer-to-peer computing / Digital signature / Threshold cryptosystem / RSA / Elliptic Curve DSA / Paillier cryptosystem / XTR / Homomorphic encryption / Digital Signature Algorithm / Cryptography / Public-key cryptography / Bitcoin

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
153Digital signature / Rabin signature algorithm / RSA / Diffie–Hellman key exchange / ElGamal encryption / Schnorr signature / Euclidean algorithm / Naccache–Stern cryptosystem / ElGamal signature scheme / Cryptography / Public-key cryptography / XTR

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
154Cramer–Shoup cryptosystem / XTR / Symbol / Universal hashing / Applied mathematics / Mathematics / Artificial intelligence / Finite fields / Ciphertext indistinguishability / Cryptography

Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing? Baodong Qin1,2 and Shengli Liu1,?? 1. Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 20

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 10:03:04
155Post-quantum cryptography / Cyberwarfare / Applied mathematics / Security / Public-key cryptography / Electronic commerce / McEliece cryptosystem

Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 08:28:15
156Cipher / ID-based encryption / Vector space / Function / Cramer–Shoup cryptosystem / Algebra / Mathematics / Cryptography

Dual System Encryption via Predicate Encodings Hoeteck Wee⋆ ENS, Paris, France Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 14:03:35
157Public-key cryptography / Finite fields / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Goppa code / Linear code / Reed–Solomon error correction / Forward error correction / Cryptography / Coding theory / Error detection and correction

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
158ID-based encryption / Ciphertext / Lattice / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / RSA / Learning with errors

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-02 00:42:27
159Cryptographic protocols / Electronic commerce / Computational hardness assumptions / RSA / Diffie–Hellman key exchange / Diffie–Hellman problem / Discrete logarithm / Schmidt–Samoa cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Finite fields

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
160Ciphertext / Chosen-ciphertext attack / Ø / PKCS1 / PKCS / Malleability / Rabin cryptosystem / Cryptography / Public-key cryptography / RSA

The RSA Cryptosystem Dan Boneh Stanford University The RSA cryptosystem

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-27 15:18:26
UPDATE