Encryption

Results: 4595



#Item
151

After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2011-01-06 01:53:57
    152

    Non-committing encryption from Φ-hiding Brett Hemenway Rafail Ostrovsky∗ Alon Rosen†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2015-01-22 15:41:21
      153

      Functional Encryption: Decentralized and Delegatable Nishanth Chandran∗ Vipul Goyal†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-11-03 09:54:12
        154

        Targeted Homomorphic Attribute Based Encryption Zvika Brakerski∗ David Cash† Rotem Tsabary∗

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-07-11 11:15:24
          155

          Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski∗ Ilan Komargodski†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-02-04 03:37:02
            156

            XEP-0384: OMEMO Encryption Andreas Straub mailto: xmpp: Version 0.1

            Add to Reading List

            Source URL: xmpp.org

            - Date: 2016-12-07 11:49:24
              157

              VMware vSphere 6.5 Virtual Machine Encryption Performance

              Add to Reading List

              Source URL: www.vmware.com

                158

                Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-02-05 16:46:30
                  159

                  Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2013-10-21 19:18:05
                    160

                    Functional Encryption for Turing Machines Amit Sahai† Department of Computer Science and Center for Encrypted Functionalities, UCLA, USA

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-10-28 16:00:01
                      UPDATE