Back to Results
First PageMeta Content
Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption


Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg
Add to Reading List

Document Date: 2016-02-12 12:31:57


Open Document

File Size: 347,22 KB

Share Result on Facebook