Encryption

Results: 4595



#Item
611

Maya: A Novel Block Encryption Function Mahadevan Gomathisankaran and Ruby B. Lee Electrical Engineering, Princeton University, Princeton, NJ 08544. {mgomathi,rblee}@princeton.edu Abstract. We propose a novel methodolog

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-08 08:12:02
    612

    Lattice-Based Encryption Vadim Lyubashevsky INRIA / ENS, Paris Lattice-Based Encryption Schemes 1. NTRU [Hoffstein, Pipher, Silverman ‘98]

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2013-12-21 06:12:57
      613

      Stateless-Recipient Certified E-mail System based on Verifiable Encryption Giuseppe Ateniese and Cristina Nita-Rotaru Department of Computer Science The Johns Hopkins University {ateniese,crisn}@cs.jhu.edu

      Add to Reading List

      Source URL: homes.cerias.purdue.edu

      Language: English - Date: 2003-10-28 11:56:25
        614

        Fast Software Encryption 2001 Registration Form April, Royal Park Hotel Nikko, Yokohama, Japan To be returned to: Yasuyuki Sakai Information Technology R&D Center Mitsubishi Electric Corporation

        Add to Reading List

        Source URL: www.venus.dti.ne.jp

        Language: English - Date: 2001-01-16 10:22:52
          615Cryptography / Encryption

          lauter.CCSW Cryptographic Cloud Storagex

          Add to Reading List

          Source URL: digitalpiglet.org

          Language: English - Date: 2009-11-28 04:04:00
          616

          Promote Strong Encryption and Anonymity in the Digital Age Joint Civil Society Statement Submitted to the 29th Session of the UN Human Rights Council June 17, 2015 The undersigned civil society organizations and indepen

          Add to Reading List

          Source URL: cdt.org

          Language: English - Date: 2015-06-17 09:48:39
            617

            An instantiation of the Cramer-Shoup encryption paradigm using bilinear map groups David Galindo1 , Jorge L. Villar2 1 2

            Add to Reading List

            Source URL: www.dgalindo.es

            Language: English - Date: 2007-11-26 10:35:09
              618

              Encryption Can you figure out the encrypted message? If you need a little help, just flip the paper upside down. The answer is at the bottom. A B C D E

              Add to Reading List

              Source URL: www.bookitprogram.com

              - Date: 2015-05-01 17:15:39
                619

                Identity-Based Encryption Secure Against Chosen-Ciphertext Selective Opening Attack

                Add to Reading List

                Source URL: ec14.compute.dtu.dk

                Language: English - Date: 2014-05-16 06:26:08
                  620

                  2014 9th Cyber and Information Security Research Conference Context-Aware Multimedia Encryption in Mobile Platforms Mohamed Fazeen Garima Bajwa

                  Add to Reading List

                  Source URL: nsl.cse.unt.edu

                  Language: English - Date: 2014-10-22 22:56:30
                    UPDATE