Deterministic encryption

Results: 55



#Item
41Block cipher modes of operation / CMAC / Key Wrap / Block cipher / Ciphertext / Triple DES / Advantage / Cryptography / Message authentication codes / Finite fields

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
42Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
43Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
44PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
45RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
46Index of cryptography articles / Cryptography / Ciphertext / Deterministic encryption

Searchable Encryption Prepared for[removed]February 9, 2006 Outline

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:21:12
47SHA-2 / SHA-1 / Advanced Encryption Standard / Cryptographic nonce / Hash function / Cryptography / Cryptographic hash functions / Pseudorandom number generators

The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-14 13:50:49
48Initialization vector / Probabilistic encryption / Ciphertext indistinguishability / Deterministic encryption / RSA / Disk encryption theory / Block cipher / Cipher / MapReduce / Cryptography / Homomorphic encryption / Paillier cryptosystem

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
49Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
50Paillier cryptosystem / Deterministic encryption / PostgreSQL / Query optimizer / Column / Select / Bitmap index / Query plan / Initialization vector / Cryptography / Data management / Homomorphic encryption

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: db.csail.mit.edu

Language: English - Date: 2013-03-28 09:28:30
UPDATE