Encryption

Results: 4595



#Item
11Cryptography / Functional encryption / RSA / Ciphertext indistinguishability

Non-Trivial Witness Encryption and Null-iO from Standard Assumptions Zvika Brakerski∗ Aayush Jain†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-09-07 14:53:41
12Cryptography / Multivariate cryptography / Hidden Field Equations / Equation / Field extension / XSL attack

Square, a New Multivariate Encryption Scheme Crystal Clough1 , John Baena1,2 , Jintai Ding1,4 , Bo-Yin Yang3 , and Ming-shing Chen3 1 Department of Mathematical Sciences,

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:42
13Security engineering / Computer security / Cryptography / Prevention / Computer network security / Crime prevention / Cyberwarfare / National security / Password / Mobile device management / Email encryption / Internet privacy

PreVeil. Finally, enterprise encryption end-users love PreVeil protects your data even when user passwords are stolen, admin accounts are compromised or servers are breached. Fundamentally, PreVeil provides users with be

Add to Reading List

Source URL: www.preveil.com

Language: English - Date: 2018-08-22 21:18:22
14Cryptography / Computing / Information and communications technology / Security engineering / Cloud applications / Cloud infrastructure / Data security / AXA / CAC 40 / Software as a service / Vera Security / End-to-end encryption

PRESS RELEASE PARIS, September 14th 2017 AXA Strategic Ventures invests in an end-to-end encryption solution for securing cloud-hosted data. AXA Strategic Ventures (ASV) announces today it has participated with Idinvest,

Add to Reading List

Source URL: www.axavp.com

Language: English - Date: 2018-04-06 05:43:52
15Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-10 03:50:18
16Cryptography / Key / Ciphertext indistinguishability / Encryption / Identity-based conditional proxy re-encryption

Defining Encryption Lecture 2 Defining Encryption Lecture 2 Simulation & Indistinguishability

Add to Reading List

Source URL: courses.engr.illinois.edu

Language: English - Date: 2016-01-26 11:27:29
17

Linking OAE and Blockwise Attack Models Fast Software Encryption 2017 Guillaume Endignoux1,2 , Damian Vizár1 1 EPFL,

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2017-03-06 13:58:14
    18

    Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

    Add to Reading List

    Source URL: crypto-events.di.ens.fr

    Language: English - Date: 2017-07-12 10:12:05
      19

      Int. J. Advanced Networking and Applications Volume: 05 Issue: 01 Pages:ISSN : Study of Encryption and Decryption of

      Add to Reading List

      Source URL: www.ijana.in

      Language: English - Date: 2013-09-17 01:05:57
        20

        Testimony by Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology Senate Judiciary Committee Hearing “Going Dark: Encryption, Technology, and the Balance

        Add to Reading List

        Source URL: fpf.org

        Language: English - Date: 2015-09-09 11:19:26
          UPDATE