Encryption

Results: 4595



#Item
131

Order-Revealing Encryption and the Hardness of Private Learning Mark Bun∗ Mark Zhandry†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2015-05-02 22:28:11
    132

    Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1 Stanford University

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2015-05-25 22:53:51
      133

      draft-ietf-httpbis-http2-encryption-08 - Opportunistic Security for HTTP

      Add to Reading List

      Source URL: tools.ietf.org

      - Date: 2016-11-01 23:04:15
        134

        Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-07-29 01:21:17
          135

          Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes? Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-09-10 02:45:52
            136

            Encryption Working Group Year-End Report December 20, 2016 Signed by: Chairman Fred Upton (R-MI)

            Add to Reading List

            Source URL: energycommerce.house.gov

            - Date: 2016-12-20 16:05:00
              137

              Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev† Abstract

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-09-15 01:20:37
                138

                Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey† Omer Reingold∗

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2012-01-30 19:12:55
                  139

                  Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗ Dan Boneh† Craig Gentry‡

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2014-05-20 14:24:26
                    140

                    Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2013-09-30 19:57:01
                      UPDATE