Deterministic encryption

Results: 55



#Item
11Cryptography / Deterministic encryption / Chosen-plaintext attack / Digital signature / Advantage / Attack model / Encryption / Block cipher / Search engine technology

Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs Rutgers University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2015-10-18 00:55:12
12Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
13Cryptography / Homomorphic encryption / Encryption / Internet of things / Paillier cryptosystem / Deterministic encryption / ElGamal encryption / Gateway / Key / Computer security / Cloud computing security / Data in use

Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-07-21 13:59:17
14

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:18:42
    15

    Computationally sound typing for Non-Interference: The case of deterministic encryption J. Courant, C. Ene, and Y. Lakhnech VERIMAG - University Joseph Fourier - CNRS - INPG 2, av. de Vignates, 38610 Gi`eres - FRANCE

    Add to Reading List

    Source URL: www-verimag.imag.fr

    Language: English - Date: 2013-01-07 06:16:47
      16Pseudorandom number generators / Cryptography / Kleptography / National Institute of Standards and Technology / NIST SP 800-90A / Random number generation / Cryptographic Module Validation Program / FIPS 140-2 / Pseudorandomness / Advanced Encryption Standard / Random seed / Entropy

      ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-08-13 08:03:11
      17Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

      Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

      Add to Reading List

      Source URL: www.andrew.cmu.edu

      Language: English - Date: 2016-02-12 12:31:57
      18Cryptography / Deterministic encryption / Encryption / Hash function / Bloom filter / Padding / Key

      raykova.ccsw_sads [Compatibility Mode]

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-11-28 04:00:03
      19

      Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE Yang Cui1,2 , Kirill Morozov1 , Kazukuni Kobara1,2 , and Hideki Imai1,2 1

      Add to Reading List

      Source URL: imi.kyushu-u.ac.jp

      Language: English - Date: 2009-03-11 17:28:44
        UPDATE