Encryption

Results: 4595



#Item
631

Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en

Add to Reading List

Source URL: imm.dtu.dk

Language: English - Date: 2014-03-13 15:47:35
    632Alan Turing / Cryptography / Turing machine / Computability theory / Models of computation / Codebreaker / Public-key cryptography / Known-plaintext attack / Cipher / Turing / Encryption / Cryptanalysis

    ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14

    Add to Reading List

    Source URL: www.cs4fn.org

    Language: English - Date: 2012-11-21 11:20:28
    633Cryptography / Side-channel attacks / Advanced Encryption Standard / Pseudorandom number generators / Data masking / AES implementations / Power analysis / Block cipher / Entropy

    Microsoft Word - Reconfig2013_cr_v01.doc

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2013-11-15 15:24:17
    634

    Commuting signatures and veriable encryption Georg Fuchsbauer University of Bristol EUROCRYPT

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2011-06-06 13:44:20
      635

      IN THIS ISSUE • Why Spam May Never Go Away • Firewalls • Are You Taking Advantage of the Security Features in Your Operating System? • Encryption •and more... Information and Educational Technology News for UC

      Add to Reading List

      Source URL: ittimes.ucdavis.edu

      Language: English - Date: 2006-10-30 19:01:57
        636

        A Novel Commutative Blinding Identity Based Encryption Scheme Yu Chen Song Luo

        Add to Reading List

        Source URL: fps2011.dyndns.org

        Language: English
          637Cryptography / Abstract algebra / Algebra / Elliptic curves / Group theory / Supersingular elliptic curve / Trapdoor function / Finite fields / Elliptic curve / Lenstra elliptic curve factorization / Elliptic curve primality

          A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

          Add to Reading List

          Source URL: www.dgalindo.es

          Language: English - Date: 2007-11-26 10:35:53
          638

          Threshold Encryption into Multiple Ciphertexts Martin Stanek Department of Computer Science Comenius University

          Add to Reading List

          Source URL: fps2011.dyndns.org

          Language: English
            639

            Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 Universität Passau

            Add to Reading List

            Source URL: des.cse.nsysu.edu.tw

            Language: English - Date: 2014-12-07 09:37:30
              640

              Do you care about Fast Software Encryption (and Decryption)? Rumpsession FSE 2007

              Add to Reading List

              Source URL: fse2007.uni.lu

              Language: English - Date: 2007-05-23 09:25:58
                UPDATE