Malleability

Results: 104



#Item
31Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Microsoft WordA Secure Scheme for Authenticated Encryprion.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 07:11:04
32An extended abstract of this paper is published in the proceedings of the 13th International Conference on Cryptology in India [21] – IndocryptThis is the full version. On the Non-malleability of the Fiat-Shamir

An extended abstract of this paper is published in the proceedings of the 13th International Conference on Cryptology in India [21] – IndocryptThis is the full version. On the Non-malleability of the Fiat-Shamir

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-16 15:16:50
33Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1  Vincenzo Iovino2

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
34Public-Key Steganography with Active Attacks Michael Backes Christian Cachin  IBM Research

Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-26 15:47:29
35Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1  Department of Information Engineering, Chinese University of Hong Ko

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
36Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak †  Daniel Wichs ‡

Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak † Daniel Wichs ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-15 11:15:53
37∗  How to Break XML Encryption Tibor Jager  Juraj Somorovsky

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
38CS255: Cryptography and Computer Security  Winter 2004 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:20
39CS255: Cryptography and Computer Security  Winter 2000 Assignment #1

CS255: Cryptography and Computer Security Winter 2000 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-11 23:12:09
40Journal of Experimental Social Psychology 37, 000 – [removed]doi:[removed]jesp[removed], available online at http://www.idealibrary.com on Reducing the Effects of Stereotype Threat on African American College Student

Journal of Experimental Social Psychology 37, 000 – [removed]doi:[removed]jesp[removed], available online at http://www.idealibrary.com on Reducing the Effects of Stereotype Threat on African American College Student

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2009-10-13 10:09:43