Encryption

Results: 4595



#Item
671

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Daniel Luchaup1 Kevin P. Dyer2

Add to Reading List

Source URL: kpdyer.com

Language: English - Date: 2015-08-17 17:04:54
    672Elliptic curve cryptography / Pairing-based cryptography / Public-key cryptography / Group theory / Finite fields / Tate pairing / Hyperelliptic curve / Weil pairing / BonehLynnShacham / BonehFranklin scheme / Pairing / ID-based encryption

    Bilinear Pairings in Cryptography Master thesis #603 by

    Add to Reading List

    Source URL: www.math.ru.nl

    Language: English - Date: 2009-07-13 10:25:27
    673

    Automated Proofs for Asymmetric Encryption J. Courant, M. Daubignard, C. Ene, P. Lafourcade and Y. Lakhnech ? Universit´e Grenoble 1, CNRS,Verimag

    Add to Reading List

    Source URL: www-verimag.imag.fr

    Language: English - Date: 2013-01-07 06:16:47
      674

      Automated Proofs for Asymmetric Encryption. ⋆ Judica¨el Courant, Marion Daubignard, Cristian Ene, Yassine Lakhnech, and Pascal Lafourcade

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2008-09-19 09:09:56
        675

        Computationally sound typing for Non-Interference: The case of deterministic encryption J. Courant, C. Ene, and Y. Lakhnech VERIMAG - University Joseph Fourier - CNRS - INPG 2, av. de Vignates, 38610 Gi`eres - FRANCE

        Add to Reading List

        Source URL: www-verimag.imag.fr

        Language: English - Date: 2013-01-07 06:16:47
          676

          Area Optimization of Lightweight Lattice-Based Encryption on Reconfigurable Hardware Thomas P¨oppelmann Tim G¨uneysu

          Add to Reading List

          Source URL: www.sha.rub.de

          Language: English - Date: 2014-03-23 10:02:43
            677

            This paper appears in Orr Dunkelman, editor, CT-RSA 2012, Springer-Verlag LNCS 7178, 332–348, Plaintext-Checkable Encryption S´ebastien Canard1 , Georg Fuchsbauer2 , Aline Gouget3 , and Fabien Laguillaumie4 1

            Add to Reading List

            Source URL: www.di.ens.fr

            Language: English - Date: 2012-04-02 11:25:19
              678

              1 Accelerating Fully Homomorphic Encryption in Hardware ¨ urk, Berk Sunar Yarkın Dor¨oz, Erdinc¸ Ozt¨

              Add to Reading List

              Source URL: ecewp.ece.wpi.edu

              Language: English - Date: 2013-09-10 17:22:20
                679

                Forward-Secure Distributed Encryption⋆ Wouter Lueks1 , Jaap-Henk Hoepman1 , and Klaus Kursawe2 1 2

                Add to Reading List

                Source URL: www.petsymposium.org

                Language: English - Date: 2014-06-27 07:04:35
                  680

                  Encryption Can you figure out the encrypted message? If you need a little help, just flip the paper upside down. The answer is at the bottom. A B C D E

                  Add to Reading List

                  Source URL: www.bookitprogram.com

                  - Date: 2015-05-01 17:18:25
                    UPDATE