Deterministic encryption

Results: 55



#Item
1Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey†  Omer Reingold∗

Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey† Omer Reingold∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2012-01-30 19:12:55
    2Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-11-29 11:47:05
      3Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

      Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-01-10 04:13:59
        4Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1

        Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        - Date: 2009-09-20 01:41:31
          5An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

          An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2007-08-20 03:23:28
          6The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

          The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2007-08-20 03:22:52
          7Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg ()  May 21, 2013

          Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-11 00:33:15
          8Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs

          Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs

          Add to Reading List

          Source URL: paul.rutgers.edu

          Language: English - Date: 2015-10-27 14:52:24
          9Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1  Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

          Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-08-24 18:12:50
          10Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1  Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

          Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-08-24 18:12:50