Encryption

Results: 4595



#Item
561Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
562

WhatsApp Encryption Overview Technical white paper April 4, 2016

Add to Reading List

Source URL: assets.documentcloud.org

Language: English - Date: 2016-04-05 15:25:41
    563Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

    AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2015-10-15 15:27:48
    564

    Ecient Public Key Encryption Based on Ideal Lattices (Extended Abstract) Damien Stehlé1,2 , Ron Steinfeld2 , Keisuke Tanaka3 , and Keita Xagawa3 1 3

    Add to Reading List

    Source URL: users.monash.edu.au

    Language: English - Date: 2009-09-04 02:49:37
      565Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

      Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

      Add to Reading List

      Source URL: isi.jhu.edu

      Language: English - Date: 2016-03-21 17:23:50
      566Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

      WhatsApp Encryption Overview Technical white paper April 4, 2016

      Add to Reading List

      Source URL: www.whatsapp.com

      Language: English
      567Cryptography / Encryption / ElGamal encryption / Mix network / Ciphertext / Public-key cryptography / RSA / Cipher / Identity-based conditional proxy re-encryption / Proxy re-encryption

      Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:49:00
      568

      BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren1 , Mart´ın Ochoa2,3 , and Andrei Sabelfeld1 1

      Add to Reading List

      Source URL: www.cse.chalmers.se

      Language: English - Date: 2015-09-01 04:55:38
        569

        Deciding the Security of Protocols with Commuting Public Key Encryption? Yannick Chevalier1 , Ralf K¨ usters2 , Micha¨el Rusinowitch1 , Mathieu Turuani2 1

        Add to Reading List

        Source URL: www.loria.fr

        Language: English - Date: 2003-10-02 12:13:52
          570Computing / Email / Cyberspace / Internet privacy / Secure communication / Opportunistic TLS / Transport Layer Security / Simple Mail Transfer Protocol / Extended SMTP / Email encryption / Opportunistic encryption / Gmail

          Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

          Add to Reading List

          Source URL: zakird.com

          Language: English
          UPDATE