Homomorphic encryption

Results: 238



#Item
61Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:16:36
62

IEEEHORNS: A semi-perfectly secret homomorphic encryption system Mahadevan Gomathisankaran

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2014-11-03 11:41:05
    63Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-02-12 12:31:57
    64

    HORNS: A Homomorphic Encryption Scheme for Cloud Computing using Residue Number System Mahadevan Gomathisankaran Akhilesh Tyagi

    Add to Reading List

    Source URL: nsl.cse.unt.edu

    Language: English - Date: 2012-01-08 08:10:08
      65

      Enhanced Flexibility for Homomorphic Encryption Schemes via CRT Yin Hu, William J. Martin, Berk Sunar Worcester Polytechnic Institute Abstract. The Chinese Remainder Theorem (CRT) has numerous applications including in

      Add to Reading List

      Source URL: ecewp.ece.wpi.edu

      Language: English - Date: 2012-11-29 11:41:35
        66

        Information-flow control for programming on encrypted data∗ J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman April 13, 2012 Abstract Using homomorphic encryption and secure multiparty computation, cloud servers may

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2012-04-13 18:08:34
          67

          Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan University of Toronto Abstract— A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypte

          Add to Reading List

          Source URL: www.cs.utoronto.ca

          Language: English - Date: 2011-09-08 00:17:47
            68

            FULLY HOMOMORPHIC ENCRYPTION FOR MATHEMATICIANS ALICE SILVERBERG Abstract. We give an introduction to Fully Homomorphic Encryption for mathematicians. Fully Homomorphic Encryption allows untrusted parties to take encrypt

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2013-05-29 01:06:51
              69

              Private Genome Analysis through Homomorphic Encryption Miran Kim1 and Kristin Lauter2 1 Seoul National University (SNU), Republic of Korea

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-10-07 02:39:07
                70

                5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea Secret Program Execution in the Cloud Applying Homomorphic Encryption Michael Brenner, Jan W

                Add to Reading List

                Source URL: www.dcsec.uni-hannover.de

                Language: English - Date: 2011-05-31 02:01:36
                  UPDATE