Hybrid cryptosystem

Results: 12



#Item
1The BlueJay Ultra-Lightweight Hybrid Cryptosystem

The BlueJay Ultra-Lightweight Hybrid Cryptosystem

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:20
2Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
3Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1  2

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
4Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:33:23
5KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
6Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1  2

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
7Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]

Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:20
8Report on Present State of PSEC-KEM Cryptosystem Evaluation (screening evaluation) January 28, 2002 Natsume Matsuzaki, Member

Report on Present State of PSEC-KEM Cryptosystem Evaluation (screening evaluation) January 28, 2002 Natsume Matsuzaki, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
9Report on Present State of EPOC-2 Cryptosystem Evaluation (full evaluation) January 28, 2002 Hajime Watanabe, Member Public-Key Cryptography

Report on Present State of EPOC-2 Cryptosystem Evaluation (full evaluation) January 28, 2002 Hajime Watanabe, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
10The BlueJay Ultra-Lightweight Hybrid Cryptosystem Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 300 Addison, TX 75001, USA. [removed]

The BlueJay Ultra-Lightweight Hybrid Cryptosystem Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 300 Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40