Encryption

Results: 4595



#Item
521

Immunizing Encryption Schemes from Decryption Errors Cynthia Dwork1 , Moni Naor2? , and Omer Reingold2?? 1 Microsoft Research, SVC 1065 L’Avenida

Add to Reading List

Source URL: omereingold.files.wordpress.com

Language: English - Date: 2014-10-22 01:55:07
    522

    Encryption Schemes Secure Against Chosen-Ciphertext Selective Opening Attacks Serge Fehr1 and Dennis Hofheinz2? and Eike Kiltz1?? and Hoeteck Wee3? ? ? 1 2

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:33
      523

      Asymmetric encryption with 2 XOR’s: the cipher TCHo Jean-Philippe Aumasson

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:47:00
        524Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

        Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

        Add to Reading List

        Source URL: www.bouncycastle.org

        Language: English - Date: 2016-04-29 19:57:45
        525

        Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening 1 2

        Add to Reading List

        Source URL: www.kjdf.de

        Language: English - Date: 2014-06-10 05:37:33
          526

          Some (In)Sufficient Conditions for Secure Hybrid Encryption Javier Herranza , Dennis Hofheinzb , Eike Kiltzc a Dept. Matem`

          Add to Reading List

          Source URL: www.kjdf.de

          Language: English - Date: 2014-06-10 05:37:44
            527

            The Theory of Dynamic Encryption, a New Approach to Cryptography 1 Bo Dömstedt , Jesper Jansson

            Add to Reading List

            Source URL: www.protego.se

            Language: English - Date: 2013-09-06 06:00:28
              528

              Technical Report HCIA by Protego Information AB Introduction The encryption and decryption of information has long been an important tool for preventing unauthorized and undesired access to secret information, whether th

              Add to Reading List

              Source URL: www.protego.se

              Language: English - Date: 2013-09-06 06:00:33
                529

                ACM CCS, Scottsdale AZ, NovemberControlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1

                Add to Reading List

                Source URL: seclab.illinois.edu

                Language: English - Date: 2014-08-29 10:37:00
                  530Analysis of algorithms / Cache / Oblivious ram / Search engine indexing / Oblivious data structure / Keyword / Computer science / Computing

                  The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed University of Illinois at Urbana-Champaign ABSTRACT Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-07-05 14:57:39
                  UPDATE