Homomorphic encryption

Results: 238



#Item
131Homomorphic encryption / Applied mathematics / RSA / Cryptographic Test Correction / Ciphertext / Cipher / Semantic security / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Cryptography / Cyberwarfare / Security

C:/Documents and Settings/Administrator/My Documents/PAPERS/Accepted/EC10/IHE/latest-version/ihe.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-08 10:17:47
132ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
133Differential privacy / Secure multi-party computation / Cipher / Privacy / Homomorphic encryption / Internet privacy / ElGamal encryption / Cryptography / Public-key cryptography / Data privacy

Privacy-Preserving Aggregation of Time-Series Data Elaine Shi PARC/UC Berkeley T-H. Hubert Chan The University of Hong Kong

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2011-02-10 19:20:15
134Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
135Privacy / Differential privacy / Ciphertext / RSA / Cipher / Completeness / Advantage / ICE / Internet privacy / Cryptography / Homomorphic encryption / ElGamal encryption

Data Collection With Self-Enforcing Privacy Philippe Golle Frank McSherry Ilya Mironov

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-11-30 12:42:35
136Ideal lattice cryptography / Cipher / Encryption / Public-key cryptography / Mathematical sciences / Science / Disk encryption / Cryptography / Homomorphic encryption / Mathematics

Securing the cloud with homomorphic encryption Research Directorate staff

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-06-10 12:49:49
137PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-04-25 03:42:22
138Peer-to-peer computing / Digital signature / Threshold cryptosystem / RSA / Elliptic Curve DSA / Paillier cryptosystem / XTR / Homomorphic encryption / Digital Signature Algorithm / Cryptography / Public-key cryptography / Bitcoin

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
139Digital signal processing / Fourier analysis / Polynomials / Multiplication / Numerical analysis / Multiplication algorithm / Discrete Fourier transform / Fast Fourier transform / Homomorphic encryption / Mathematics / Mathematical analysis / Abstract algebra

Accelerating Somewhat Homomorphic Evaluation using FPGAs ¨ urk1 , Yarkın Dor¨oz2 , Berk Sunar2 and Erkay Sava¸s3 Erdin¸c Ozt¨ 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 12:45:28
140Oblivious transfer / Ciphertext indistinguishability / Verifiable computing / Cryptography / Homomorphic encryption / RSA

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
UPDATE