ElGamal encryption

Results: 138



#Item
31Microsoft PowerPoint - IRMA eID 0.3.pptx

Microsoft PowerPoint - IRMA eID 0.3.pptx

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-08 08:50:17
32Werking van het eID Stelsel

Werking van het eID Stelsel

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-23 06:24:06
33An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
34Ciphertext-Policy Attribute-Based Encryption

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
35Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese  Information Security Institute

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
36Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
37An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
38Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University  of Luxembourg, Faculty of Sciences, Technology and Communication

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
39Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
40Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang†  Dongdai Lin∗

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37