ElGamal encryption

Results: 138



#Item
11Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher  Simon Duquennoy

Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-09-17 04:43:33
12Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-07-21 13:59:17
13Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp? Yi-Ruei Chen, Shiuan-Tzuo Shen, and Wen-Guey Tzeng Department of Computer Science, National Chiao Tung University, Taiwan yrchen.cs98g@nctu.

Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp? Yi-Ruei Chen, Shiuan-Tzuo Shen, and Wen-Guey Tzeng Department of Computer Science, National Chiao Tung University, Taiwan yrchen.cs98g@nctu.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-28 09:47:05
    14Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA  Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

    Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

    Add to Reading List

    Source URL: dedis.cs.yale.edu

    Language: English - Date: 2012-06-25 13:47:28
    15Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:45
    16An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

    An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-02-05 01:02:43
    17CS276 Cryptography  Spring 2006 Lecture 19: Lecturer: David Wagner

    CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    18Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆  Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

    Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24
    191234145467836391829836846489A2BCBD183  École doctorale nO 84 : Sciences et technologies de l’information et de la communication  Doctorat ParisTech

    1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24