Homomorphic encryption

Results: 238



#Item
21Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-05-05 08:36:37
22Homeomorphisms / Homomorphic encryption / Public-key cryptography / FHE / Cryptography / Academia / Mathematics

C:/Users/koblitz.NETID/Downloads/tight2.dvi

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2016-04-20 17:13:18
23Identity management / Law / Privacy / Internet privacy / Pi / Analysis

BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren 1 Martín Ochoa 2,3

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
24Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / ISO standards / Ubiquitous computing / Paillier cryptosystem / EZ-Link / Homomorphic encryption / HTTPS / Internet privacy / Advanced Card Systems

Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-08-28 05:10:21
25Cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Semantic security / Cryptosystem / RSA / Data Encryption Standard

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
26Cryptography / Public-key cryptography / Homomorphic encryption / Secure multi-party computation / Cryptographic protocol / Paillier cryptosystem / Privacy / Digital signature / Internet privacy / Zero-knowledge proof / Encryption / Cloud computing security

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
27Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:39
28Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Language: English - Date: 2015-09-29 10:45:40
29Public-key cryptography / Homeomorphisms / Homomorphic encryption / Cryptography / Institute for Applied Information Processing and Communications / FHE

Cryptography for the Cloud Advisor(s): Christian Rechberger, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
30Public-key cryptography / Coding theory / Finite fields / Information theory / Linear network coding / Wireless sensor network / RSA / Digital signature / Homomorphism / Homomorphic encryption

Homomorphic Signatures for Verifiable Computing Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
UPDATE