Deterministic encryption

Results: 55



#Item
41The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
42An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
43Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
44Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
45An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
46Searchable Encryption Prepared for[removed]February 9, 2006  Outline

Searchable Encryption Prepared for[removed]February 9, 2006 Outline

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:21:12
47The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-14 13:50:49
48MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani  Rupak Majumdar

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
49Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University  Allison Lewko†

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
50Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: db.csail.mit.edu

Language: English - Date: 2013-03-28 09:28:30