Encryption

Results: 4595



#Item
741

Efficient Identity-Based Encryption over NTRU Lattices L´eo Ducas? , Vadim Lyubashevsky?? , and Thomas Prest? ? ? Abstract. Efficient implementations of lattice-based cryptographic schemes have been limited to only the

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2015-05-04 09:10:58
    742Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English - Date: 2016-01-19 07:39:30
    743

    When Homomorphism Becomes a Liability Zvika Brakerski∗ Abstract We show that an encryption scheme cannot have a simple decryption function and be homomorphic at the same time, even with added noise. Specifically, if a

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-09-01 18:54:16
      744

      Manual: Generation of certificate request (CSR) and a key pair The purpose of this document is to describe the procedure of installing the institution’s certificates to eToken Pro encryption token and other actions in

      Add to Reading List

      Source URL: www.sk.ee

      Language: English - Date: 2014-06-10 01:29:47
        745

        Robust Authenticated Encryption and the Limits of Symmetric Cryptography? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-09-14 09:48:53
          746Pseudorandom number generators / Cryptography / Kleptography / National Institute of Standards and Technology / NIST SP 800-90A / Random number generation / Cryptographic Module Validation Program / FIPS 140-2 / Pseudorandomness / Advanced Encryption Standard / Random seed / Entropy

          ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-08-13 08:03:11
          747

          Building a Demilitarized Zone with Data Encryption for Grid Environments Matthias Schmidt, Matthew Smith, Niels Fallenbeck, Hans Picht, Bernd Freisleben Department of Mathematics and Computer Science, University of Marbu

          Add to Reading List

          Source URL: www.dcsec.uni-hannover.de

          Language: English - Date: 2010-11-03 12:17:51
            748Internet Standards / Message authentication codes / Advanced Encryption Standard / Poly1305 / Stream ciphers / Cryptographic software / Salsa20 / Daniel J. Bernstein / Cipher suite / Authenticated encryption / LibreSSL / Transport Layer Security

            ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

            Add to Reading List

            Source URL: www.ietf.org

            Language: English - Date: 2013-11-05 13:13:43
            749Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

            Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

            Add to Reading List

            Source URL: isc2015.item.ntnu.no

            Language: English - Date: 2015-09-20 14:16:36
            750

            Motivation Identity-based Online/offline Encryption Security Conclusion Identity-Based Online/Offline Encryption

            Add to Reading List

            Source URL: fc08.ifca.ai

            Language: English - Date: 2008-05-08 09:53:37
              UPDATE