Encryption

Results: 4595



#Item
711Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:37
712

Over-encryption: Management of Access Control Evolution on Outsourced Data Sara Foresti Sushil Jajodia

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:10
    713

    On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2010-04-20 22:07:08
      714

      Short Overview Ring-LWE Encryption Scheme Our Implementation Implementation Results Conclusion

      Add to Reading List

      Source URL: www.cryptoexperts.com

      Language: English - Date: 2015-11-13 04:48:41
        715

        Accelerating Fully Homomorphic Encryption on GPUs Wei Wang,Yin Hu,Lianmu Chen,Xinming Huang and Berk Sunar Department of Electrial and Computer Engineering Worcester Polytechnic Institute, Worcester, MA, USA weiwang@ece.

        Add to Reading List

        Source URL: ecewp.ece.wpi.edu

        Language: English - Date: 2012-11-29 11:41:35
          716

          Secure USB 2.0 CESG CCTM Portable Hard Drive READY With real-time CBC-AES 256-bit hardware encryption, PIN access and software free design, the perfect

          Add to Reading List

          Source URL: www.istorage-uk.com

          Language: English - Date: 2015-08-10 07:19:17
            717Cryptography / Py / Differential cryptanalysis / Advanced Encryption Standard / Block cipher / Bart Preneel / Side-channel attack / Cryptanalysis / ICE

            ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

            Add to Reading List

            Source URL: isc2015.item.ntnu.no

            Language: English - Date: 2015-09-20 14:17:24
            718Cryptography / Public-key cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Encryption / Malleability / Mental poker

            Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

            Add to Reading List

            Source URL: fc15.ifca.ai

            Language: English - Date: 2015-01-11 00:33:27
            UPDATE