Elgamal

Results: 165



#Item
21CS276 Cryptography  Spring 2006 Lecture 19: Lecturer: David Wagner

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
22Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆  Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
231234145467836391829836846489A2BCBD183  École doctorale nO 84 : Sciences et technologies de l’information et de la communication  Doctorat ParisTech

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
24Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Add to Reading List

Source URL: book.huihoo.com

Language: English - Date: 2006-07-27 09:21:33
25Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
26AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
27Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
28The GNU Privacy Handbook  The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
29Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs†  April 29, 2015

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
30Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi  ?

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43