Encryption

Results: 4595



#Item
171

Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh∗ Ananth Raghunathan†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2014-07-29 01:54:29
    172

    Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption Prabhanjan Ananth∗ Aayush Jain†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-08-31 14:18:59
      173

      Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-22 05:13:43
        174

        Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis† Moni Naor ‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2009-10-28 16:23:20
          175

          Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe W. Bos1 , Kristin Lauter1 , Jake Loftus2? , and Michael Naehrig1 1 Microsoft Research, {jbos,klauter,mnaehrig}@microsoft.com

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2013-09-30 18:14:41
            176

            International Journal of Security and Its Applications Vol.9, No), pphttp://dx.doi.orgijsiaHybrid Lightweight and Robust Encryption Design for Security in IoT

            Add to Reading List

            Source URL: www.sersc.org

            - Date: 2016-01-11 04:39:36
              177

              Public Key Encryption with keyword Search Dan Boneh∗ Stanford University Giovanni Di Crescenzo Telcordia

              Add to Reading List

              Source URL: crypto.stanford.edu

              - Date: 2010-06-04 16:24:13
                178

                Compactness vs Collusion Resistance in Functional Encryption∗ Baiyu Li† Daniele Micciancio‡ Abstract

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-06-02 20:14:22
                  179

                  Polymorphic Encryption and Pseudonymisation for Personalised Healthcare A Whitepaper Version 1.1 Eric Verheul, Bart Jacobs, Carlo Meijer,

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-09-30 09:38:35
                    180

                    The encryption dilemma The FBI wants the data on a terrorist’s iPhone, but does it really need Apple’s help? “My job is to protect the personal data of over 1.6 billion people,” exclaimed Alex Stamos, Chief Secur

                    Add to Reading List

                    Source URL: 18798-presscdn-pagely.netdna-ssl.com

                    - Date: 2016-10-03 21:19:24
                      UPDATE