Encryption

Results: 4595



#Item
751

IEEEHORNS: A semi-perfectly secret homomorphic encryption system Mahadevan Gomathisankaran

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2014-11-03 11:41:05
    752Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-02-12 12:31:57
    753

    Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity ? Myrto Arapinis, Sergiu Bursuc, and Mark D. Ryan School of Computer Science, University of Birmingha

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2012-01-11 08:43:03
      754

      Hardware-Based Cryptanalysis of the GSM A5/1 Encryption Algorithm

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2010-04-20 22:07:08
        755Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

        The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2007-03-29 16:18:56
        756Cryptography / Database / Key management / Cloud storage / Encryption / Database encryption / Cloud computing security

        Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications Krishna P. N. Puttaswamy Christopher Kruegel

        Add to Reading List

        Source URL: www.cs.ucsb.edu

        Language: English - Date: 2011-08-30 11:54:47
        757

        HORNS: A Homomorphic Encryption Scheme for Cloud Computing using Residue Number System Mahadevan Gomathisankaran Akhilesh Tyagi

        Add to Reading List

        Source URL: nsl.cse.unt.edu

        Language: English - Date: 2012-01-08 08:10:08
          758Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

          Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

          Add to Reading List

          Source URL: www.dgalindo.es

          Language: English - Date: 2007-11-26 10:35:45
          759

          Encryption based on Card Shuffle Jooyoung Lee Faculty of Mathematics and Statistics, Sejong University October 3, 2015

          Add to Reading List

          Source URL: www1.spms.ntu.edu.sg

          Language: English - Date: 2015-10-05 00:19:26
            760

            Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

            Add to Reading List

            Source URL: conferences.sigcomm.org

            Language: English - Date: 2015-07-30 09:27:18
              UPDATE