Encryption

Results: 4595



#Item
141

Attribute-Based Encryption for Circuits Sergey Gorbunov∗ Vinod Vaikuntanathan† Hoeteck Wee‡

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2013-05-31 21:04:06
    142

    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-11-29 11:47:05
      143

      NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-11-28 08:24:01
        144

        Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-01-10 04:13:59
          145

          Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-10-22 01:56:45
            146

            Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds (Extended Version) Kevin Lewi Stanford University

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-08-08 15:12:50
              147

              From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth∗ UCLA Zvika Brakerski†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-02-16 17:56:27
                148

                HPE HPE6-A19 Exam Volume: 72 Questions Question No: 1 Where in the controller would we configure a wireless network NOT to use encryption? A. AAA profile

                Add to Reading List

                Source URL: demo.examkiller.net

                - Date: 2016-10-31 21:59:05
                  149

                  Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds (Extended Version) Kevin Lewi Stanford University

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-08-08 15:12:50
                    150

                    Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-05-07 11:56:24
                      UPDATE