Elgamal

Results: 165



#Item
11Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
12Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher  Simon Duquennoy

Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-09-17 04:43:33
13Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-07-21 13:59:17
14Call for Papers 6th International Conference on Cryptology AFRICACRYPT 2013 June 22-24, 2013, Cairo, Egypt http://www.egyptscience.net/Africacrypt2013/ Confirmed Invited Speaker: Taher El Gamal, Inventor of ElGamal Encry

Call for Papers 6th International Conference on Cryptology AFRICACRYPT 2013 June 22-24, 2013, Cairo, Egypt http://www.egyptscience.net/Africacrypt2013/ Confirmed Invited Speaker: Taher El Gamal, Inventor of ElGamal Encry

Add to Reading List

Source URL: egyptscience.net

Language: English - Date: 2013-02-03 01:28:40
    15TTP SmartCard-based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections Authors: Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca UNESCO Chair in Data Privacy

    TTP SmartCard-based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections Authors: Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca UNESCO Chair in Data Privacy

    Add to Reading List

    Source URL: fps2011.dyndns.org

    Language: English
      16Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp? Yi-Ruei Chen, Shiuan-Tzuo Shen, and Wen-Guey Tzeng Department of Computer Science, National Chiao Tung University, Taiwan yrchen.cs98g@nctu.

      Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp? Yi-Ruei Chen, Shiuan-Tzuo Shen, and Wen-Guey Tzeng Department of Computer Science, National Chiao Tung University, Taiwan yrchen.cs98g@nctu.

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-28 09:47:05
        17Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA  Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

        Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

        Add to Reading List

        Source URL: dedis.cs.yale.edu

        Language: English - Date: 2012-06-25 13:47:28
        18Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

        Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

        Add to Reading List

        Source URL: www.dgalindo.es

        Language: English - Date: 2007-11-26 10:35:45
        19An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

        An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

        Add to Reading List

        Source URL: www.eng.biu.ac.il

        Language: English - Date: 2013-02-05 01:02:43