Malleability

Results: 104



#Item
41Handling 
omplexity and 
hange in grid 
omputing Advanced School for Computing and Imaging  This work was 
arried out in graduate s
hool ASCI.

Handling omplexity and hange in grid omputing Advanced School for Computing and Imaging This work was arried out in graduate s hool ASCI.

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2010-03-01 03:50:16
42Capital Malleability, Emission Leakage and the Cost of Partial Climate Policies: General Equilibrium Analysis of the European Union Emission Trading System Elisa Lanzi1 Environment Dept.

Capital Malleability, Emission Leakage and the Cost of Partial Climate Policies: General Equilibrium Analysis of the European Union Emission Trading System Elisa Lanzi1 Environment Dept.

Add to Reading List

Source URL: people.bu.edu

Language: English - Date: 2013-01-25 15:55:05
43The RSA Cryptosystem  Dan Boneh Stanford University  The RSA cryptosystem

The RSA Cryptosystem Dan Boneh Stanford University The RSA cryptosystem

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-27 15:18:26
44CS255: Cryptography and Computer Security  Winter 2004 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-03-01 20:32:14
45Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
46Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:04:55
47Distributed Blinding for ElGamal Re-encryption∗ Lidong Zhou†, Michael A. Marsh‡, Fred B. Schneider§, and Anna Redz¶ January 2, 2004  Abstract

Distributed Blinding for ElGamal Re-encryption∗ Lidong Zhou†, Michael A. Marsh‡, Fred B. Schneider§, and Anna Redz¶ January 2, 2004 Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-16 13:38:04
48A practical and secure coercion-resistant scheme for remote elections (Extended Abstract) Roberto Ara´ ujo1 , S´ebastien Foulle2 , and Jacques Traor´e2

A practical and secure coercion-resistant scheme for remote elections (Extended Abstract) Roberto Ara´ ujo1 , S´ebastien Foulle2 , and Jacques Traor´e2

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2008-01-15 03:40:40
49KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
50Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54