Integrated Encryption Scheme

Results: 46



#Item
1D:/Documents/Courses/Winter 2014/aez/rae.dvi

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
2Microsoft Word - nljul2005_2_.doc

Microsoft Word - nljul2005_2_.doc

Add to Reading List

Source URL: www.barc.gov.in

Language: English - Date: 2012-08-10 06:17:36
3Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin  Alina Oprea

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2005-09-02 12:11:39
4CODING CONCEPTS  TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:45
5CSCI-GAMATH-GAIntroduction to Cryptography  April 25, 2012

CSCI-GAMATH-GAIntroduction to Cryptography April 25, 2012

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2012-04-18 13:05:18
6Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 02:28:12
7Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 20:36:43
8A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
9Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 09:55:41
10Predicate Privacy in Encryption Systems Emily Shen MIT   Elaine Shi

Predicate Privacy in Encryption Systems Emily Shen MIT Elaine Shi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-24 17:15:01