Cryptosystem

Results: 355



#Item
51Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† †  Richard Shin†

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-10-01 22:05:30
52Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing Sikhar Patranabis, Yash Shrivastava and Debdeep Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology Kha

Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing Sikhar Patranabis, Yash Shrivastava and Debdeep Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology Kha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-22 10:55:43
    53Published in Electronics Letters 33(23):1938, Cryptosystem of Chua and Ling Acknowledgements: We are grateful to S.-K. Chua and S. Ling for sending a preprint of their paper.

    Published in Electronics Letters 33(23):1938, Cryptosystem of Chua and Ling Acknowledgements: We are grateful to S.-K. Chua and S. Ling for sending a preprint of their paper.

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:57
      54On a new fast public key cryptosystem Samir Bouftass arXiv:1508.07756v1 [cs.CR] 31 AugE-mail : .

      On a new fast public key cryptosystem Samir Bouftass arXiv:1508.07756v1 [cs.CR] 31 AugE-mail : .

      Add to Reading List

      Source URL: cryptome.org

      Language: English - Date: 2015-09-09 07:54:11
        55An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais  Jean-Pierre Tillich

        An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais Jean-Pierre Tillich

        Add to Reading List

        Source URL: pqcrypto2013.xlim.fr

        Language: English - Date: 2013-06-24 09:56:08
          562138  IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013 Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy

          2138 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013 Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy

          Add to Reading List

          Source URL: sefcom.asu.edu

          Language: English - Date: 2014-11-20 12:03:52
            57PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

            PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

            Add to Reading List

            Source URL: ect.bell-labs.com

            Language: English - Date: 2010-12-15 21:39:38
            58Science Summer School Clocks and Secret Messages - with upgraded problem! The ciphertext OH7586BB46R3627O26BB9 was produced by applying an affine cryptosystem to each letter of the following 37-letter alphabet.

            Science Summer School Clocks and Secret Messages - with upgraded problem! The ciphertext OH7586BB46R3627O26BB9 was produced by applying an affine cryptosystem to each letter of the following 37-letter alphabet.

            Add to Reading List

            Source URL: hamilton.nuigalway.ie

            - Date: 2015-06-25 08:28:24
              59XXXX, 1–33  © De Gruyter YYYY NTRU Cryptosystem: Recent Developments and Emerging Mathematical Problems in Finite

              XXXX, 1–33 © De Gruyter YYYY NTRU Cryptosystem: Recent Developments and Emerging Mathematical Problems in Finite

              Add to Reading List

              Source URL: users.monash.edu.au

              Language: English - Date: 2014-05-13 01:20:10
                60Civitas: Implementation of a Threshold Cryptosystem Adam M. Davis  Dmitri Chmelev

                Civitas: Implementation of a Threshold Cryptosystem Adam M. Davis Dmitri Chmelev

                Add to Reading List

                Source URL: www.cs.cornell.edu

                Language: English - Date: 2009-08-03 10:33:09