ElGamal encryption

Results: 138



#Item
21Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Add to Reading List

Source URL: book.huihoo.com

Language: English - Date: 2006-07-27 09:21:33
22Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
23AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
24Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
25The GNU Privacy Handbook  The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
26Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs†  April 29, 2015

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
27Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi  ?

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
28This article has been accepted for publication by ISPEC 2014, but has not been fully edited. Content may change prior to final publication. Citation information: DOI: , ISPEC 2014: Th

This article has been accepted for publication by ISPEC 2014, but has not been fully edited. Content may change prior to final publication. Citation information: DOI: , ISPEC 2014: Th

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-20 04:52:56
29Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1  Royal Holloway, University of London

Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 16:38:11
30A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:06:04