Encryption

Results: 4595



#Item
721

Published In W. Meier and D. Mukhopadhyay, Eds., Progress in Cryptology − INDOCRYPT 2014, volof Lecture Notes in Computer Science, p. XXI, Springer, 2014. Recent Advances in ID-based Encryption (Invited Talk) Ma

Add to Reading List

Source URL: joye.site88.net

- Date: 2015-09-04 19:43:52
    722

    Universally Composable Symbolic Analysis - for Two-Party Protocols based on Homomorphic Encryption Morten Dahl and Ivan Damgård Aarhus University

    Add to Reading List

    Source URL: ec14.compute.dtu.dk

    Language: English - Date: 2014-05-16 07:05:24
      723

      Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

      Add to Reading List

      Source URL: www.isg.rhul.ac.uk

      Language: English - Date: 2015-04-07 11:20:55
        724Public-key cryptography / Rabe / Attribute-based encryption

        General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps by Pratish Datta joint work with

        Add to Reading List

        Source URL: isc2015.item.ntnu.no

        Language: English - Date: 2015-09-19 12:55:00
        725

        Practical Applications of Homomorphic Encryption Michael Brenner, Henning Perl and Matthew Smith Distributed Computing Security Group, Leibniz Universitt Hannover, Hannover, Germany {brenner, perl, smith}@dcsec.uni-hanno

        Add to Reading List

        Source URL: www.dcsec.uni-hannover.de

        Language: English - Date: 2012-07-30 13:48:14
          726

          Automated Proofs for Asymmetric Encryption: First results in the random oracle model J. Courant, M. Daubignard, C. Ene, P. Lafourcade and Y. Lakhnech ∗ Universit´e Grenoble 1, CNRS,V ERIMAG June 9, 2008

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          Language: English - Date: 2008-09-19 09:09:55
            727Computer architecture / Computing / Computer engineering / Central processing unit / Computer memory / Instruction set architectures / Cache / Advanced Encryption Standard / CPU cache / Side-channel attack / ARM architecture / Reduced instruction set computing

            Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

            Add to Reading List

            Source URL: euler.ecs.umass.edu

            Language: English - Date: 2011-03-24 10:57:36
            728Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

            Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

            Add to Reading List

            Source URL: dedis.cs.yale.edu

            Language: English - Date: 2012-06-25 13:47:28
            729

            The Locality of 
 Searchable Symmetric Encryption David Cash Stefano Tessaro

            Add to Reading List

            Source URL: ec14.compute.dtu.dk

            Language: English - Date: 2014-05-16 06:33:46
              730

              Efficient Identity-Based Encryption using NTRU Lattices L´eo Ducas, Vadim Lyubashevsky and Thomas Prest February 3, 2015

              Add to Reading List

              Source URL: www.di.ens.fr

              Language: English - Date: 2015-02-03 08:25:37
                UPDATE