Encryption

Results: 4595



#Item
651

Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP Zvika Brakerski∗ Abstract We present a new tensoring technique for LWE-based fully homomorphic encryption. While

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-18 19:13:22
    652Kharagpur / West Bengal / Indian Institute of Technology Kharagpur / Indian Institutes of Technology / Indian Institute of Technology Kanpur / Indian Institute of Technology Bhubaneswar / Homomorphic encryption / India

    Introduction Preliminaries Protocol

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 13:00:48
    653

    CLOC: Authenticated Encryption for Short Input⋆ Tetsu Iwata1 , Kazuhiko Minematsu2 , Jian Guo3 , and Sumio Morioka4 1 Nagoya University, Japan, NEC Corporation, Japan,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-03-01 01:27:49
      654Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

      A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-02-17 07:57:12
      655

      J Autom Reasoning:261–291 DOIs10817x Automated Proofs for Asymmetric Encryption J. Courant · M. Daubignard · C. Ene · P. Lafourcade · Y. Lakhnech

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2012-12-05 06:09:36
        656Fractals / Iterated function / Operations research / Artificial neural network / Mathematical optimization / Numerical analysis / Pi / Tiny Encryption Algorithm

        Physics without Laws - Making exact Predictions with data based Methods

        Add to Reading List

        Source URL: reglos.de

        Language: English - Date: 2009-11-01 18:19:41
        657

        Lectures on the NTRU encryption algorithm and digital signature scheme: Grenoble, June 2002 J. Pipher Brown University, Providence RI

        Add to Reading List

        Source URL: www.math.brown.edu

        Language: English - Date: 2005-01-04 12:35:21
          658

          Automated Security Proof for Symmetric Encryption Modes. ? Martin Gagné2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Reihaneh Safavi-Naini2 1

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          Language: English - Date: 2009-09-01 13:12:37
            659Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

            - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

            Add to Reading List

            Source URL: security-lab.jaist.ac.jp

            Language: English - Date: 2015-11-09 21:16:55
            UPDATE