Encryption

Results: 4595



#Item
681

Efficient Circuit-Size Independent Public Key Encryption with KDM Security Tal Malkin1 , Isamu Teranishi1,2 , and Moti Yung1,3 1 Columbia University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2011-02-08 15:43:32
    682

    Efficient Identity-Based Encryption over NTRU Lattices L´eo Ducas? , Vadim Lyubashevsky?? , and Thomas Prest? ? ? Abstract. Efficient implementations of lattice-based cryptographic schemes have been limited to only the

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2014-09-29 05:29:23
      683

      Fully Homomophic Encryption over the Integers Revisited Jung Hee Cheon1 and Damien Stehl´e2 1 SNU, Republic of Korea, 2 ENS de Lyon, France. ,

      Add to Reading List

      Source URL: perso.ens-lyon.fr

      Language: English - Date: 2015-04-24 06:44:32
        684

        Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

        Add to Reading List

        Source URL: www.scottcoull.com

        Language: English - Date: 2014-03-03 12:03:06
          685Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

          Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-01-02 12:48:47
          686

          Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More Nuttapong Attrapadung (Nuts)

          Add to Reading List

          Source URL: ec14.compute.dtu.dk

          Language: English - Date: 2014-06-06 04:13:08
            687

            Honey Encryption: Security Beyond the Brute‐force Bound Ari Juels Cornell Tech Thomas Ristenpart

            Add to Reading List

            Source URL: ec14.compute.dtu.dk

            Language: English - Date: 2014-05-16 06:35:11
              688Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

              Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

              Add to Reading List

              Source URL: tls.mbed.org

              Language: English
              689Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

              Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

              Add to Reading List

              Source URL: pub.ist.ac.at

              Language: English - Date: 2014-06-19 16:51:50
              690

              HORNS: A Homomorphic Encryption Scheme for Cloud Computing using Residue Number System Mahadevan Gomathisankaran Akhilesh Tyagi

              Add to Reading List

              Source URL: nsl.cse.unt.edu

              Language: English - Date: 2012-01-08 08:10:08
                UPDATE