Encryption

Results: 4595



#Item
771

FULLY HOMOMORPHIC ENCRYPTION FOR MATHEMATICIANS ALICE SILVERBERG Abstract. We give an introduction to Fully Homomorphic Encryption for mathematicians. Fully Homomorphic Encryption allows untrusted parties to take encrypt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-29 01:06:51
    772

    Frequency-Hiding Order-Preserving Encryption Florian Kerschbaum SAP Karlsruhe, Germany

    Add to Reading List

    Source URL: www.fkerschbaum.org

    Language: English - Date: 2015-12-21 21:49:17
      773

      Searchable Encryption Supporting General Boolean Expression Queries Tarik Moataz1 and Abdullatif Shikfa2 1 2

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-03-27 20:42:00
        774

        NIH Smart Card Guide to Using NIH Smart Card for Encryption and Digital Signature with Mac OS X Apple Mail Version 1.1

        Add to Reading List

        Source URL: ocio.nih.gov

        Language: English - Date: 2015-08-08 14:13:31
          775

          LAW ENFORCEMENT GUIDELINES What is Wickr? Wickr is a free app that provides military-grade encryption of text, picture, audio and video messages. Senders control who can read their messages and how long their message wil

          Add to Reading List

          Source URL: www.wickr.com

          Language: English
            776

            Towards Automated Proofs for Asymmetric Encryption Schemes in the Random Oracle Model Judicaël Courant, Marion Daubignard, Cristian Ene, ∗ Pascal Lafourcade, Yassine Lakhnech Université Grenoble 1, CNRS,Verimag

            Add to Reading List

            Source URL: www.lsv.ens-cachan.fr

            Language: English - Date: 2008-09-19 09:09:56
              777

              Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2009-08-09 19:41:15
                778Security / Cryptography / Mass surveillance / Surveillance / Privacy of telecommunications / War on Terror / National Security Agency / Bullrun / Global surveillance disclosures / XKeyscore / Encryption / Dual EC DRBG

                Microsoft PowerPoint - preneel_snowden_rio_2015v1.pptx

                Add to Reading List

                Source URL: homes.esat.kuleuven.be

                Language: English - Date: 2015-06-29 13:18:07
                779

                REBEL: Reconfigurable Block Encryption Logic Mahadevan Gomathisankaran Department of Electrical Engineering, Princeton University, Princeton, New Jersey, USA Ka-Ming Keung, Akhilesh Tyagi

                Add to Reading List

                Source URL: nsl.cse.unt.edu

                Language: English - Date: 2012-01-08 08:12:32
                  780

                  Fully Private Revocable Predicate Encryption? Juan Manuel Gonz´ alez Nieto1 and Mark Manulis2 and Dongdong Sun1 1 Queensland University of Technology, Brisbane QLD 4001, Australia

                  Add to Reading List

                  Source URL: manulis.eu

                  Language: English - Date: 2012-10-06 20:48:24
                    UPDATE